Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-43389 (GCVE-0-2021-43389)
Vulnerability from cvelistv5
- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T03:55:28.480Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://seclists.org/oss-sec/2021/q4/39"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/"
},
{
"name": "[oss-security] 20211105 Re: Linux kernel: isdn: cpai: array-index-out-of-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2021/11/05/1"
},
{
"name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"name": "DSA-5096",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2022/dsa-5096"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-07-25T16:40:02",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://seclists.org/oss-sec/2021/q4/39"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/"
},
{
"name": "[oss-security] 20211105 Re: Linux kernel: isdn: cpai: array-index-out-of-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2021/11/05/1"
},
{
"name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"name": "DSA-5096",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2022/dsa-5096"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-43389",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15",
"refsource": "MISC",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15"
},
{
"name": "https://seclists.org/oss-sec/2021/q4/39",
"refsource": "MISC",
"url": "https://seclists.org/oss-sec/2021/q4/39"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"name": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"refsource": "MISC",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
},
{
"name": "[oss-security] 20211105 Re: Linux kernel: isdn: cpai: array-index-out-of-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/11/05/1"
},
{
"name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"name": "DSA-5096",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5096"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-43389",
"datePublished": "2021-11-04T18:39:06",
"dateReserved": "2021-11-04T00:00:00",
"dateUpdated": "2024-08-04T03:55:28.480Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-43389\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-11-04T19:15:07.623\",\"lastModified\":\"2024-11-21T06:29:08.323\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado un problema en el kernel de Linux versiones anteriores a 5.14.15. Se presenta un fallo de \u00edndice de matriz fuera de l\u00edmites en la funci\u00f3n detach_capi_ctr en el archivo drivers/isdn/capi/kcapi.c\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":2.1,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"5.14.15\",\"matchCriteriaId\":\"8DF5750B-219C-419D-8DD4-D9F958B68CD0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"053C1B35-3869-41C2-9551-044182DE0A64\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EDB6772-7FDB-45FF-8D72-952902A7EE56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9955F62A-75D3-4347-9AD3-5947FC365838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6D77C7-A2F4-4700-AB5A-3EC853496ECA\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2021/11/05/1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2013180\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://seclists.org/oss-sec/2021/q4/39\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5096\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2021/11/05/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2013180\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://seclists.org/oss-sec/2021/q4/39\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.debian.org/security/2022/dsa-5096\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]}]}}"
}
}
CERTFR-2021-AVI-969
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Elles permettent à un attaquant de provoquer un déni de service, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Debian 9 (strech) LTS versions antérieures à 4.9.290-1
- Debian 10 (buster) versions antérieures à 4.19.208-1
- Debian 11 (bullseye) versions antérieures à 5.10.84-1
Pour plus d'informations, veuillez-vous référer à la page de suivi des vulnérabilités de l'éditeur. [1]
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eDebian 9 (strech) LTS versions ant\u00e9rieures \u00e0 4.9.290-1\u003c/li\u003e \u003cli\u003eDebian 10 (buster) versions ant\u00e9rieures \u00e0 4.19.208-1\u003c/li\u003e \u003cli\u003eDebian 11 (bullseye) versions ant\u00e9rieures \u00e0 5.10.84-1\u003c/li\u003e \u003c/ul\u003e \u003cp\u003ePour plus d\u0027informations, veuillez-vous r\u00e9f\u00e9rer \u00e0 la page de suivi des vuln\u00e9rabilit\u00e9s de l\u0027\u00e9diteur. [1]\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-20317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
},
{
"name": "CVE-2021-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
},
{
"name": "CVE-2021-3816",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3816"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2020-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38199"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"name": "CVE-2021-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3820"
},
{
"name": "CVE-2021-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
},
{
"name": "CVE-2021-4273",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4273"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-0920",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0920"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"name": "CVE-2020-16119",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16119"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2021-12-20T00:00:00",
"last_revision_date": "2021-12-20T00:00:00",
"links": [
{
"title": "[1] Page de suivi des vuln\u00e9rabilit\u00e9s",
"url": "https://security-tracker.debian.org/tracker/source-package/linux"
}
],
"reference": "CERTFR-2021-AVI-969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service,\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dla-2843 du 16 d\u00e9cembre 2021",
"url": "https://www.debian.org/lts/security/2021/dla-2843"
}
]
}
CERTFR-2022-AVI-265
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38208"
},
{
"name": "CVE-2021-20317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
},
{
"name": "CVE-2020-26139",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26139"
},
{
"name": "CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"name": "CVE-2021-33034",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33034"
},
{
"name": "CVE-2021-34693",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34693"
},
{
"name": "CVE-2020-25672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25672"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2021-3483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3483"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-45095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45095"
},
{
"name": "CVE-2021-3573",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3573"
},
{
"name": "CVE-2021-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
},
{
"name": "CVE-2018-5995",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5995"
},
{
"name": "CVE-2020-12655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
},
{
"name": "CVE-2021-28711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28711"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2021-4135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4135"
},
{
"name": "CVE-2021-28713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28713"
},
{
"name": "CVE-2021-45402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45402"
},
{
"name": "CVE-2022-0264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0264"
},
{
"name": "CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"name": "CVE-2021-3506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3506"
},
{
"name": "CVE-2021-28712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28712"
},
{
"name": "CVE-2021-33098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33098"
},
{
"name": "CVE-2022-0516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0516"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-45480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45480"
},
{
"name": "CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"name": "CVE-2020-25671",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25671"
},
{
"name": "CVE-2021-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
},
{
"name": "CVE-2021-29650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29650"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2021-3564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3564"
},
{
"name": "CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2021-45469",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45469"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39685"
},
{
"name": "CVE-2020-26147",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26147"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"name": "CVE-2016-2854",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2854"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2022-0382",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0382"
},
{
"name": "CVE-2021-28714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28714"
},
{
"name": "CVE-2020-25670",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25670"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-28972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28972"
},
{
"name": "CVE-2021-23134",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23134"
},
{
"name": "CVE-2021-32399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32399"
},
{
"name": "CVE-2021-20292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20292"
},
{
"name": "CVE-2019-19449",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19449"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2021-28715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28715"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2016-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2853"
},
{
"name": "CVE-2021-39648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39648"
},
{
"name": "CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"name": "CVE-2020-25673",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25673"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2022-0742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0742"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-03-23T00:00:00",
"last_revision_date": "2022-03-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-265",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nUbuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire, un d\u00e9ni de service et une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5343-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5343-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5339-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5339-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5338-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5338-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Ubuntu USN-5337-1 du 22 mars 2022",
"url": "https://ubuntu.com/security/notices/USN-5337-1"
}
]
}
CERTFR-2024-AVI-0610
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Manager Proxy 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Manager Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12 12-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2022-48651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48651"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2022-48756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48756"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2021-47407",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47407"
},
{
"name": "CVE-2023-52762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2023-52808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52808"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2024-35828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35828"
},
{
"name": "CVE-2024-35805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35805"
},
{
"name": "CVE-2022-48772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48772"
},
{
"name": "CVE-2024-35886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35886"
},
{
"name": "CVE-2022-48743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48743"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-35822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35822"
},
{
"name": "CVE-2024-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2021-47379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47379"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2022-48722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48722"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38546"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2022-48711",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48711"
},
{
"name": "CVE-2024-26852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4244"
},
{
"name": "CVE-2023-52507",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52507"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2024-35962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35962"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2021-47297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47297"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2024-36952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36952"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-26880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26880"
},
{
"name": "CVE-2024-36025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
},
{
"name": "CVE-2022-48761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48761"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2021-47270",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47270"
},
{
"name": "CVE-2024-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
},
{
"name": "CVE-2021-47498",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47498"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2023-52855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52855"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2021-47603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47603"
},
{
"name": "CVE-2021-47193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47193"
},
{
"name": "CVE-2021-4439",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4439"
},
{
"name": "CVE-2022-48740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48740"
},
{
"name": "CVE-2022-48758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48758"
},
{
"name": "CVE-2021-47293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47293"
},
{
"name": "CVE-2021-47602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47602"
},
{
"name": "CVE-2024-35950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35950"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2023-52683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2024-39301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39301"
},
{
"name": "CVE-2021-47372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47372"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27399"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2023-52754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52754"
},
{
"name": "CVE-2023-52809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2021-47589",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47589"
},
{
"name": "CVE-2021-46955",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46955"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2021-47555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47555"
},
{
"name": "CVE-2021-47103",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47103"
},
{
"name": "CVE-2021-47201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47201"
},
{
"name": "CVE-2024-39475",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39475"
},
{
"name": "CVE-2021-47434",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47434"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38610"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2021-47445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47445"
},
{
"name": "CVE-2023-52753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52753"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-35247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35247"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2022-48754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48754"
},
{
"name": "CVE-2024-35869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35869"
},
{
"name": "CVE-2023-52819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52819"
},
{
"name": "CVE-2022-48759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48759"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2021-47328",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47328"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47267",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47267"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-35864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35864"
},
{
"name": "CVE-2021-47383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47383"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2023-52670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
},
{
"name": "CVE-2023-52693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52693"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2021-47309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47309"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2021-47294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47294"
},
{
"name": "CVE-2021-47587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47587"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2023-52752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52752"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-47547",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47547"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2022-48733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48733"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2022-48715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48715"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2024-36880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36880"
},
{
"name": "CVE-2024-26828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26828"
},
{
"name": "CVE-2021-47354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47354"
},
{
"name": "CVE-2021-47566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47566"
},
{
"name": "CVE-2024-26687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26687"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-35863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35863"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-26894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26894"
},
{
"name": "CVE-2021-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47520"
},
{
"name": "CVE-2024-35930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2020-10135",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10135"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2024-38661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38661"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2021-47418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47418"
},
{
"name": "CVE-2024-26928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26928"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-35819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35819"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-26863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26863"
},
{
"name": "CVE-2024-35861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35861"
},
{
"name": "CVE-2024-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38597"
},
{
"name": "CVE-2024-26813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26813"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2021-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47145"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2021-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47518"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-26930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26930"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2023-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5281"
},
{
"name": "CVE-2021-47600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47600"
},
{
"name": "CVE-2023-52843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52843"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2024-26766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26766"
},
{
"name": "CVE-2024-38580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38580"
},
{
"name": "CVE-2024-26745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26745"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2024-36899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36899"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2024-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38545"
},
{
"name": "CVE-2024-26622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26622"
},
{
"name": "CVE-2021-47571",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47571"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"name": "CVE-2024-35922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35922"
},
{
"name": "CVE-2021-47275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47275"
}
],
"initial_release_date": "2024-07-19T00:00:00",
"last_revision_date": "2024-07-19T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0610",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2472-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242472-1"
},
{
"published_at": "2024-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2493-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242493-1"
},
{
"published_at": "2024-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2487-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242487-1"
},
{
"published_at": "2024-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2530-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242530-1"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2474-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242474-1"
},
{
"published_at": "2024-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2488-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242488-1"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2448-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242448-1"
},
{
"published_at": "2024-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2480-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242480-1"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2447-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242447-1"
},
{
"published_at": "2024-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2561-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242561-1"
},
{
"published_at": "2024-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2559-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242559-1"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2449-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242449-1"
},
{
"published_at": "2024-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2549-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242549-1"
},
{
"published_at": "2024-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2495-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242495-1"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2473-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242473-1"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2437-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242437-1"
},
{
"published_at": "2024-07-18",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2558-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242558-1"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2446-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242446-1"
}
]
}
CERTFR-2022-AVI-231
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian stable (bullseye) versions ant\u00e9rieures \u00e0 5.10.103-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian oldstable (buster) versions ant\u00e9rieures \u00e0 4.19.232-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-20317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2021-4202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4202"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38300"
},
{
"name": "CVE-2022-0644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0644"
},
{
"name": "CVE-2021-45095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45095"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2022-0487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0487"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-28711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28711"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2021-4135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4135"
},
{
"name": "CVE-2021-28713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28713"
},
{
"name": "CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2020-36310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36310"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"name": "CVE-2021-28712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28712"
},
{
"name": "CVE-2021-45480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45480"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39713"
},
{
"name": "CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"name": "CVE-2021-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
},
{
"name": "CVE-2022-25258",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25258"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2022-25636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25636"
},
{
"name": "CVE-2020-29374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29374"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2021-22600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22600"
},
{
"name": "CVE-2021-45469",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45469"
},
{
"name": "CVE-2022-24448",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39685"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2021-28714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28714"
},
{
"name": "CVE-2022-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
},
{
"name": "CVE-2022-25375",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25375"
},
{
"name": "CVE-2021-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39686"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2021-28715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28715"
},
{
"name": "CVE-2022-24959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24959"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-03-10T00:00:00",
"last_revision_date": "2022-03-10T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-231",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, un contournement de la politique de s\u00e9curit\u00e9 et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-5095 du 09 mars 2022",
"url": "https://www.debian.org/security/2022/dsa-5095"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-5096 du 09 mars 2022",
"url": "https://www.debian.org/security/2022/dsa-5096"
}
]
}
CERTFR-2022-AVI-462
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38208"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2018-7755",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7755"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2022-1419",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1419"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2021-20292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20292"
},
{
"name": "CVE-2022-1280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1280"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-05-13T00:00:00",
"last_revision_date": "2022-05-13T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-462",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-05-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service et\nun contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20221651-1 du 12 mai 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221651-1/"
}
]
}
CERTFR-2021-AVI-914
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-42327",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42327"
},
{
"name": "CVE-2021-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
},
{
"name": "CVE-2021-43057",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43057"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2021-43267",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43267"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2021-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42252"
},
{
"name": "CVE-2021-43056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43056"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2021-12-01T00:00:00",
"last_revision_date": "2021-12-01T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-914",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5162-1 du 30 novembre 2021",
"url": "https://ubuntu.com/security/notices/USN-5162-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5165-1 du 30 novembre 2021",
"url": "https://ubuntu.com/security/notices/USN-5165-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5163-1 du 30 novembre 2021",
"url": "https://ubuntu.com/security/notices/USN-5163-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5164-1 du 30 novembre 2021",
"url": "https://ubuntu.com/security/notices/USN-5164-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5161-1 du 30 novembre 2021",
"url": "https://ubuntu.com/security/notices/USN-5161-1"
}
]
}
CERTFR-2021-AVI-923
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE MicroOS 5.1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP2 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
},
{
"name": "CVE-2017-17864",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17864"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2021-34556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34556"
},
{
"name": "CVE-2021-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3896"
},
{
"name": "CVE-2018-16882",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16882"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2020-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
},
{
"name": "CVE-2020-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4788"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2021-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3542"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2020-12655",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12655"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2017-17862",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17862"
},
{
"name": "CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"name": "CVE-2021-34981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2017-5753",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5753"
},
{
"name": "CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"name": "CVE-2021-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
},
{
"name": "CVE-2021-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"name": "CVE-2021-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
},
{
"name": "CVE-2021-20320",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20320"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42252"
},
{
"name": "CVE-2021-35477",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35477"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2018-9517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9517"
},
{
"name": "CVE-2020-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0429"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2021-12-08T00:00:00",
"last_revision_date": "2021-12-08T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-923",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-08T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213933-1 du 06 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213933-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213929-1 du 06 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213929-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213941-1 du 07 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213941-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213969-1 du 08 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213969-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213935-1 du 07 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213935-1/"
}
]
}
CERTFR-2022-AVI-264
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de Debian. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Debian 9 stretch LTS versions ant\u00e9rieures \u00e0 4.19.232-1~deb9u1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "Debian 9 stretch versions ant\u00e9rieures \u00e0 4.9.303-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-20317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
},
{
"name": "CVE-2021-29264",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29264"
},
{
"name": "CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"name": "CVE-2021-4202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4202"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38300"
},
{
"name": "CVE-2022-0644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0644"
},
{
"name": "CVE-2021-45095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45095"
},
{
"name": "CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"name": "CVE-2022-0487",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0487"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-28711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28711"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2021-4135",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4135"
},
{
"name": "CVE-2021-28713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28713"
},
{
"name": "CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"name": "CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2022-0330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0330"
},
{
"name": "CVE-2021-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39714"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"name": "CVE-2021-28712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28712"
},
{
"name": "CVE-2021-45480",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45480"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39713"
},
{
"name": "CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"name": "CVE-2021-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
},
{
"name": "CVE-2022-25258",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25258"
},
{
"name": "CVE-2021-28950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28950"
},
{
"name": "CVE-2020-36322",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36322"
},
{
"name": "CVE-2020-29374",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29374"
},
{
"name": "CVE-2021-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4155"
},
{
"name": "CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2021-22600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22600"
},
{
"name": "CVE-2021-45469",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45469"
},
{
"name": "CVE-2022-24448",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
},
{
"name": "CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"name": "CVE-2022-0492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0492"
},
{
"name": "CVE-2021-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39685"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2021-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39698"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2021-28714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28714"
},
{
"name": "CVE-2022-0617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0617"
},
{
"name": "CVE-2022-25375",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25375"
},
{
"name": "CVE-2021-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39686"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2021-28715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28715"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2022-24959",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24959"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-03-23T00:00:00",
"last_revision_date": "2022-03-23T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-264",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nDebian. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nun d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une\natteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de Debian",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Debian dla-2940 du 09 mars 2022",
"url": "https://www.debian.org/lts/security/2022/dla-2940"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de Debian dla-2941 du 09 mars 2022",
"url": "https://www.debian.org/lts/security/2022/dla-2941"
}
]
}
CERTFR-2022-AVI-569
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.0 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.0",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.0",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.0",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38208"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2019-19377",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19377"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2021-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39711"
},
{
"name": "CVE-2018-7755",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7755"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2022-1419",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1419"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2017-13695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13695"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-20292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20292"
},
{
"name": "CVE-2022-21180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-06-20T00:00:00",
"last_revision_date": "2022-06-20T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-569",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20222111-1 du 17 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222111-1/"
}
]
}
CERTFR-2022-AVI-008
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 14.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20317"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-4001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4001"
},
{
"name": "CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2021-43267",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43267"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-43056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43056"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-01-07T00:00:00",
"last_revision_date": "2022-01-07T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-008",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-01-07T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5209-1 du 06 janvier 2022",
"url": "https://ubuntu.com/security/notices/USN-5209-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0083-1 du 06 janvier 2022",
"url": "https://ubuntu.com/security/notices/LSN-0083-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5207-1 du 05 janvier 2022",
"url": "https://ubuntu.com/security/notices/USN-5207-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5210-1 du 06 janvier 2022",
"url": "https://ubuntu.com/security/notices/USN-5210-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5208-1 du 06 janvier 2022",
"url": "https://ubuntu.com/security/notices/USN-5208-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5211-1 du 06 janvier 2022",
"url": "https://ubuntu.com/security/notices/USN-5211-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5206-1 du 05 janvier 2022",
"url": "https://ubuntu.com/security/notices/USN-5206-1"
}
]
}
CERTFR-2024-AVI-0578
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Manager Proxy 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | Public Cloud Module 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 | ||
| SUSE | N/A | SUSE Manager Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Enterprise Storage 7.1 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 | ||
| SUSE | N/A | SUSE Manager Proxy 4.1 | ||
| SUSE | N/A | SUSE Manager Server 4.2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP3 Business Critical Linux 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-10135",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10135"
},
{
"name": "CVE-2021-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3896"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"name": "CVE-2022-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2938"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0435"
},
{
"name": "CVE-2023-1829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1829"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2023-20521",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20521"
},
{
"name": "CVE-2021-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46774"
},
{
"name": "CVE-2021-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46766"
},
{
"name": "CVE-2023-20526",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20526"
},
{
"name": "CVE-2023-20566",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20566"
},
{
"name": "CVE-2021-26345",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26345"
},
{
"name": "CVE-2023-20592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20592"
},
{
"name": "CVE-2022-23830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23830"
},
{
"name": "CVE-2023-20533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20533"
},
{
"name": "CVE-2022-23820",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23820"
},
{
"name": "CVE-2023-20519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20519"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6531"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2024-26622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26622"
},
{
"name": "CVE-2023-52502",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52502"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2024-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26745"
},
{
"name": "CVE-2024-26766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26766"
},
{
"name": "CVE-2024-26813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26813"
},
{
"name": "CVE-2024-26679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26679"
},
{
"name": "CVE-2024-26687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26687"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2021-46955",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46955"
},
{
"name": "CVE-2024-26863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26863"
},
{
"name": "CVE-2024-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2024-26644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26644"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2024-26894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26894"
},
{
"name": "CVE-2024-26852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26852"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2022-48651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48651"
},
{
"name": "CVE-2021-47193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47193"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2024-26930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26930"
},
{
"name": "CVE-2024-26828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26828"
},
{
"name": "CVE-2023-52882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52882"
},
{
"name": "CVE-2024-27399",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27399"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36916"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2021-47267",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47267"
},
{
"name": "CVE-2021-47270",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47270"
},
{
"name": "CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"name": "CVE-2021-47354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47354"
},
{
"name": "CVE-2021-47368",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47368"
},
{
"name": "CVE-2021-47372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47372"
},
{
"name": "CVE-2021-47379",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47379"
},
{
"name": "CVE-2021-47383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47383"
},
{
"name": "CVE-2021-47407",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47407"
},
{
"name": "CVE-2021-47418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47418"
},
{
"name": "CVE-2021-47434",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47434"
},
{
"name": "CVE-2021-47445",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47445"
},
{
"name": "CVE-2021-47518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47518"
},
{
"name": "CVE-2021-47534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47534"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"name": "CVE-2021-47555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47555"
},
{
"name": "CVE-2023-52707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52707"
},
{
"name": "CVE-2023-52754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52754"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52766"
},
{
"name": "CVE-2023-52800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52800"
},
{
"name": "CVE-2023-52808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52808"
},
{
"name": "CVE-2023-52809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2023-52834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
},
{
"name": "CVE-2023-52855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52855"
},
{
"name": "CVE-2024-26822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26822"
},
{
"name": "CVE-2024-26921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26921"
},
{
"name": "CVE-2024-26928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26928"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2024-35822",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35822"
},
{
"name": "CVE-2024-35861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35861"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2024-35863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35863"
},
{
"name": "CVE-2024-35864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35864"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2024-35869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35869"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2024-35905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35905"
},
{
"name": "CVE-2024-35922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35922"
},
{
"name": "CVE-2024-35930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35930"
},
{
"name": "CVE-2024-35950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35950"
},
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-36016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36016"
},
{
"name": "CVE-2024-36880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36880"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2023-52670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-27432",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27432"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
},
{
"name": "CVE-2024-36890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36890"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-52672",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52672"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"name": "CVE-2024-35886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35886"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-35900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2024-35962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35962"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36008"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2021-47293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47293"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2021-4439",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4439"
},
{
"name": "CVE-2021-47089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47089"
},
{
"name": "CVE-2021-47103",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47103"
},
{
"name": "CVE-2021-47247",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47247"
},
{
"name": "CVE-2021-47294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47294"
},
{
"name": "CVE-2021-47297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47297"
},
{
"name": "CVE-2021-47309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47309"
},
{
"name": "CVE-2021-47328",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47328"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2021-47515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47515"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47566"
},
{
"name": "CVE-2021-47571",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47571"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47577"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47580"
},
{
"name": "CVE-2021-47582",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47582"
},
{
"name": "CVE-2021-47583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47583"
},
{
"name": "CVE-2021-47584",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47584"
},
{
"name": "CVE-2021-47585",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47585"
},
{
"name": "CVE-2021-47586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47586"
},
{
"name": "CVE-2021-47587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47587"
},
{
"name": "CVE-2021-47589",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47589"
},
{
"name": "CVE-2021-47592",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47592"
},
{
"name": "CVE-2021-47595",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47595"
},
{
"name": "CVE-2021-47596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47596"
},
{
"name": "CVE-2021-47597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47597"
},
{
"name": "CVE-2021-47600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47600"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47602"
},
{
"name": "CVE-2021-47603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47603"
},
{
"name": "CVE-2021-47604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47604"
},
{
"name": "CVE-2021-47605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47605"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47608"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47610"
},
{
"name": "CVE-2021-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47611"
},
{
"name": "CVE-2021-47612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47612"
},
{
"name": "CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"name": "CVE-2021-47615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47615"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47618"
},
{
"name": "CVE-2021-47619",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47619"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48711",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48711"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48715"
},
{
"name": "CVE-2022-48716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48716"
},
{
"name": "CVE-2022-48717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48717"
},
{
"name": "CVE-2022-48718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48718"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48721"
},
{
"name": "CVE-2022-48722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48722"
},
{
"name": "CVE-2022-48723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48723"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48726"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48730"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48733"
},
{
"name": "CVE-2022-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48734"
},
{
"name": "CVE-2022-48735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48735"
},
{
"name": "CVE-2022-48736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48736"
},
{
"name": "CVE-2022-48737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48737"
},
{
"name": "CVE-2022-48738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48738"
},
{
"name": "CVE-2022-48739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48739"
},
{
"name": "CVE-2022-48740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48740"
},
{
"name": "CVE-2022-48743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48743"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48747"
},
{
"name": "CVE-2022-48748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48748"
},
{
"name": "CVE-2022-48749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48749"
},
{
"name": "CVE-2022-48751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48751"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48753",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48753"
},
{
"name": "CVE-2022-48754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48754"
},
{
"name": "CVE-2022-48755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48755"
},
{
"name": "CVE-2022-48756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48756"
},
{
"name": "CVE-2022-48758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48758"
},
{
"name": "CVE-2022-48759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48759"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48761"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48765",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48765"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2022-48772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48772"
},
{
"name": "CVE-2023-52735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52735"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2023-52752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52752"
},
{
"name": "CVE-2023-52762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52843"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2023-52869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52869"
},
{
"name": "CVE-2023-52884",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52884"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2024-33619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33619"
},
{
"name": "CVE-2024-35247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35247"
},
{
"name": "CVE-2024-35857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35857"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2024-36592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36592"
},
{
"name": "CVE-2024-36899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36899"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36965"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36969"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-37078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2024-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38388"
},
{
"name": "CVE-2024-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38390"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38545"
},
{
"name": "CVE-2024-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38546"
},
{
"name": "CVE-2024-38547",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38547"
},
{
"name": "CVE-2024-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38548"
},
{
"name": "CVE-2024-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38550"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2024-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38568"
},
{
"name": "CVE-2024-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38571"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-38580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38580"
},
{
"name": "CVE-2024-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38581"
},
{
"name": "CVE-2024-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38590"
},
{
"name": "CVE-2024-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38591"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2024-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38597"
},
{
"name": "CVE-2024-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38600"
},
{
"name": "CVE-2024-38603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38603"
},
{
"name": "CVE-2024-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38605"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2024-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38616"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38635"
},
{
"name": "CVE-2024-38661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38661"
},
{
"name": "CVE-2024-39301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39301"
},
{
"name": "CVE-2024-39468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39468"
},
{
"name": "CVE-2024-39469",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
},
{
"name": "CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
}
],
"initial_release_date": "2024-07-12T00:00:00",
"last_revision_date": "2024-07-12T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0578",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2362-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242362-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2372-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242372-1"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2381-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242381-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2358-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242358-1"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2396-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242396-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2351-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242351-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2376-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242376-1"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2385-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242385-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2369-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242369-1"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2335-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242335-1"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2394-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242394-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2344-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242344-1"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2384-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242384-1"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2338-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242338-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2343-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242343-1"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2326-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242326-1"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2411-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242411-1"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2337-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242337-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2368-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242368-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2365-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2407-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242407-1"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2382-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242382-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2373-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242373-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2341-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242341-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2360-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242360-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2357-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242357-1"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2410-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242410-1"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2342-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242342-1"
}
]
}
CERTFR-2021-AVI-880
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Elles permettent à un attaquant de provoquer une atteinte à l'intégrité des données, un déni de service et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | N/A | SUSE MicroOS 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
},
{
"name": "CVE-2021-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3896"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3542"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42252"
},
{
"name": "CVE-2021-34866",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34866"
},
{
"name": "CVE-2021-43056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43056"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2021-11-17T00:00:00",
"last_revision_date": "2021-11-17T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-880",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-11-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Elles permettent \u00e0 un attaquant de provoquer une atteinte \u00e0\nl\u0027int\u00e9grit\u00e9 des donn\u00e9es, un d\u00e9ni de service et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213675-1 du 17 novembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213675-1/"
}
]
}
CERTFR-2024-AVI-0693
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | N/A | Legacy Module 15-SP5 | ||
| SUSE | N/A | openSUSE Leap Micro 5.5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | N/A | SUSE Manager Proxy 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | N/A | Public Cloud Module 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP5 | ||
| SUSE | N/A | openSUSE Leap 15.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 11 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 12 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 | ||
| SUSE | N/A | openSUSE Leap 15.5 | ||
| SUSE | N/A | SUSE Manager Server 4.3 | ||
| SUSE | N/A | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | N/A | SUSE Manager Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | N/A | openSUSE Leap 15.6 | ||
| SUSE | N/A | SUSE Real Time Module 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability Extension 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | N/A | SUSE Manager Proxy 4.1 | ||
| SUSE | N/A | Basesystem Module 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15 SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | N/A | Development Tools Module 15-SP5 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | N/A | SUSE Linux Enterprise Micro 5.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Public Cloud Module 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2 Business Critical Linux 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-26558",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26558"
},
{
"name": "CVE-2021-0129",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0129"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"name": "CVE-2022-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20368"
},
{
"name": "CVE-2022-0854",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0854"
},
{
"name": "CVE-2022-2964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2964"
},
{
"name": "CVE-2022-28748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28748"
},
{
"name": "CVE-2023-1582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1582"
},
{
"name": "CVE-2023-37453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37453"
},
{
"name": "CVE-2023-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4244"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2024-26625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26625"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-26633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26633"
},
{
"name": "CVE-2023-52435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52435"
},
{
"name": "CVE-2023-52612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52612"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2023-52507",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52507"
},
{
"name": "CVE-2023-52623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52623"
},
{
"name": "CVE-2023-52619",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52619"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2024-26800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26800"
},
{
"name": "CVE-2024-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26720"
},
{
"name": "CVE-2023-52622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52622"
},
{
"name": "CVE-2024-26814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26814"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-26663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26663"
},
{
"name": "CVE-2024-26750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26750"
},
{
"name": "CVE-2024-26813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26813"
},
{
"name": "CVE-2024-27437",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27437"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2024-26676",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26676"
},
{
"name": "CVE-2024-26802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26802"
},
{
"name": "CVE-2024-26665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26665"
},
{
"name": "CVE-2024-26780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26780"
},
{
"name": "CVE-2024-26641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26641"
},
{
"name": "CVE-2023-52580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52580"
},
{
"name": "CVE-2024-26863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26863"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2024-26845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26845"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26889"
},
{
"name": "CVE-2024-26880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26880"
},
{
"name": "CVE-2024-26644",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26644"
},
{
"name": "CVE-2024-26935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26935"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27020"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2024-26635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26635"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2024-26920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26920"
},
{
"name": "CVE-2024-27016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27016"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2024-26636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26636"
},
{
"name": "CVE-2024-27065",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27065"
},
{
"name": "CVE-2024-27019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27019"
},
{
"name": "CVE-2024-26923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26923"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26623"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2021-47219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47219"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2024-26830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26830"
},
{
"name": "CVE-2021-47201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47201"
},
{
"name": "CVE-2021-47194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47194"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2023-52882",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52882"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2024-35848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35848"
},
{
"name": "CVE-2024-35947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35947"
},
{
"name": "CVE-2024-36017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36017"
},
{
"name": "CVE-2024-36889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36889"
},
{
"name": "CVE-2024-36902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36902"
},
{
"name": "CVE-2024-36904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36904"
},
{
"name": "CVE-2024-36916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36916"
},
{
"name": "CVE-2024-36919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36919"
},
{
"name": "CVE-2024-36934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36934"
},
{
"name": "CVE-2024-36939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36939"
},
{
"name": "CVE-2024-36940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36940"
},
{
"name": "CVE-2024-36941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36941"
},
{
"name": "CVE-2024-36946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36946"
},
{
"name": "CVE-2024-36950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36950"
},
{
"name": "CVE-2024-36957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36957"
},
{
"name": "CVE-2024-36959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36959"
},
{
"name": "CVE-2021-47275",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47275"
},
{
"name": "CVE-2021-47388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47388"
},
{
"name": "CVE-2021-47395",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47395"
},
{
"name": "CVE-2021-47399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47399"
},
{
"name": "CVE-2021-47402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47402"
},
{
"name": "CVE-2021-47403",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47403"
},
{
"name": "CVE-2021-47405",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47405"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47441"
},
{
"name": "CVE-2021-47468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47468"
},
{
"name": "CVE-2021-47498",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47498"
},
{
"name": "CVE-2021-47501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47501"
},
{
"name": "CVE-2021-47506",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47506"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47520"
},
{
"name": "CVE-2021-47534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47534"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47542"
},
{
"name": "CVE-2021-47555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47555"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2023-52656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52656"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2023-52683",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52683"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52693"
},
{
"name": "CVE-2023-52699",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52699"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52753"
},
{
"name": "CVE-2023-52754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52754"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2023-52759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52759"
},
{
"name": "CVE-2023-52763",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52763"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52766"
},
{
"name": "CVE-2023-52773",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52773"
},
{
"name": "CVE-2023-52774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52774"
},
{
"name": "CVE-2023-52777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52777"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52789"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52798"
},
{
"name": "CVE-2023-52799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52799"
},
{
"name": "CVE-2023-52800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52800"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52804"
},
{
"name": "CVE-2023-52805",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52805"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52807"
},
{
"name": "CVE-2023-52808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52808"
},
{
"name": "CVE-2023-52809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52809"
},
{
"name": "CVE-2023-52810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52810"
},
{
"name": "CVE-2023-52811",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52811"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52815"
},
{
"name": "CVE-2023-52816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52816"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52819"
},
{
"name": "CVE-2023-52821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52821"
},
{
"name": "CVE-2023-52825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52825"
},
{
"name": "CVE-2023-52826",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52826"
},
{
"name": "CVE-2023-52832",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52832"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52834"
},
{
"name": "CVE-2023-52838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52838"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52841"
},
{
"name": "CVE-2023-52844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52844"
},
{
"name": "CVE-2023-52847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52847"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52853"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52855"
},
{
"name": "CVE-2023-52856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52856"
},
{
"name": "CVE-2023-52858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52858"
},
{
"name": "CVE-2023-52861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52861"
},
{
"name": "CVE-2023-52864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52864"
},
{
"name": "CVE-2023-52865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52865"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52868"
},
{
"name": "CVE-2023-52870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52870"
},
{
"name": "CVE-2023-52871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52871"
},
{
"name": "CVE-2023-52872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52872"
},
{
"name": "CVE-2023-52873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52873"
},
{
"name": "CVE-2023-52875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52875"
},
{
"name": "CVE-2023-52876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52876"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2023-52880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52880"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2024-269355",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-269355"
},
{
"name": "CVE-2024-27419",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27419"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2024-35806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35806"
},
{
"name": "CVE-2024-35828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35828"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-35861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35861"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2024-35864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35864"
},
{
"name": "CVE-2024-35869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35869"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2024-35887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35887"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35905"
},
{
"name": "CVE-2024-35950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35950"
},
{
"name": "CVE-2024-35966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35966"
},
{
"name": "CVE-2024-35967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35967"
},
{
"name": "CVE-2024-35976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35976"
},
{
"name": "CVE-2024-35978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35978"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-36014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36014"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-36938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36938"
},
{
"name": "CVE-2024-36942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36942"
},
{
"name": "CVE-2024-36944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36944"
},
{
"name": "CVE-2024-36947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36947"
},
{
"name": "CVE-2024-36952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36952"
},
{
"name": "CVE-2024-36955",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36955"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-52658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52658"
},
{
"name": "CVE-2023-52670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52670"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-27432",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27432"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35819"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-35837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35837"
},
{
"name": "CVE-2024-35889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35889"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2024-35961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35961"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2024-35997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35997"
},
{
"name": "CVE-2024-36020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36020"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36025"
},
{
"name": "CVE-2024-36890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36890"
},
{
"name": "CVE-2024-36894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36894"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2023-52672",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52672"
},
{
"name": "CVE-2024-27414",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27414"
},
{
"name": "CVE-2024-35805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35805"
},
{
"name": "CVE-2024-35807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35807"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-35884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35884"
},
{
"name": "CVE-2024-35886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35886"
},
{
"name": "CVE-2024-35893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35893"
},
{
"name": "CVE-2024-35896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35896"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-35899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35899"
},
{
"name": "CVE-2024-35900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35900"
},
{
"name": "CVE-2024-35925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35925"
},
{
"name": "CVE-2024-35934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35934"
},
{
"name": "CVE-2024-35962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35962"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-36005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36005"
},
{
"name": "CVE-2024-36008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36008"
},
{
"name": "CVE-2024-36288",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36288"
},
{
"name": "CVE-2024-36960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36960"
},
{
"name": "CVE-2024-36964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36964"
},
{
"name": "CVE-2024-36971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36971"
},
{
"name": "CVE-2024-37353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37353"
},
{
"name": "CVE-2024-38381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38381"
},
{
"name": "CVE-2024-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38549"
},
{
"name": "CVE-2024-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38552"
},
{
"name": "CVE-2024-38558",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38558"
},
{
"name": "CVE-2024-38559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38559"
},
{
"name": "CVE-2024-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38560"
},
{
"name": "CVE-2024-38565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38565"
},
{
"name": "CVE-2024-38567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38567"
},
{
"name": "CVE-2024-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38578"
},
{
"name": "CVE-2024-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38579"
},
{
"name": "CVE-2024-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38582"
},
{
"name": "CVE-2024-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38583"
},
{
"name": "CVE-2024-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38587"
},
{
"name": "CVE-2024-38598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38598"
},
{
"name": "CVE-2024-38599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38599"
},
{
"name": "CVE-2024-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38601"
},
{
"name": "CVE-2024-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38618"
},
{
"name": "CVE-2024-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38621"
},
{
"name": "CVE-2024-38627",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38627"
},
{
"name": "CVE-2024-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38633"
},
{
"name": "CVE-2024-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38634"
},
{
"name": "CVE-2024-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38659"
},
{
"name": "CVE-2024-38780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38780"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2024-27064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27064"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2021-4439",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4439"
},
{
"name": "CVE-2021-47089",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47089"
},
{
"name": "CVE-2021-47103",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47103"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2021-47515",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47515"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47566"
},
{
"name": "CVE-2021-47571",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47571"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47577"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47580",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47580"
},
{
"name": "CVE-2021-47582",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47582"
},
{
"name": "CVE-2021-47583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47583"
},
{
"name": "CVE-2021-47584",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47584"
},
{
"name": "CVE-2021-47585",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47585"
},
{
"name": "CVE-2021-47586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47586"
},
{
"name": "CVE-2021-47587",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47587"
},
{
"name": "CVE-2021-47589",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47589"
},
{
"name": "CVE-2021-47592",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47592"
},
{
"name": "CVE-2021-47595",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47595"
},
{
"name": "CVE-2021-47596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47596"
},
{
"name": "CVE-2021-47597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47597"
},
{
"name": "CVE-2021-47600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47600"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47602"
},
{
"name": "CVE-2021-47603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47603"
},
{
"name": "CVE-2021-47604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47604"
},
{
"name": "CVE-2021-47605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47605"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47608"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47610"
},
{
"name": "CVE-2021-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47611"
},
{
"name": "CVE-2021-47612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47612"
},
{
"name": "CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"name": "CVE-2021-47615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47615"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47618"
},
{
"name": "CVE-2021-47619",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47619"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48711",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48711"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48715"
},
{
"name": "CVE-2022-48716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48716"
},
{
"name": "CVE-2022-48717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48717"
},
{
"name": "CVE-2022-48718",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48718"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48721"
},
{
"name": "CVE-2022-48722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48722"
},
{
"name": "CVE-2022-48723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48723"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48726"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48730",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48730"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48733",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48733"
},
{
"name": "CVE-2022-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48734"
},
{
"name": "CVE-2022-48735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48735"
},
{
"name": "CVE-2022-48736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48736"
},
{
"name": "CVE-2022-48737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48737"
},
{
"name": "CVE-2022-48738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48738"
},
{
"name": "CVE-2022-48739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48739"
},
{
"name": "CVE-2022-48740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48740"
},
{
"name": "CVE-2022-48743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48743"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48747"
},
{
"name": "CVE-2022-48748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48748"
},
{
"name": "CVE-2022-48749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48749"
},
{
"name": "CVE-2022-48751",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48751"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48753",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48753"
},
{
"name": "CVE-2022-48754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48754"
},
{
"name": "CVE-2022-48755",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48755"
},
{
"name": "CVE-2022-48756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48756"
},
{
"name": "CVE-2022-48758",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48758"
},
{
"name": "CVE-2022-48759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48759"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48761",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48761"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48765",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48765"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2022-48772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48772"
},
{
"name": "CVE-2023-52735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52735"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2023-52752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52752"
},
{
"name": "CVE-2023-52762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52762"
},
{
"name": "CVE-2023-52784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52784"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52843"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2023-52869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52869"
},
{
"name": "CVE-2023-52884",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52884"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2024-33619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33619"
},
{
"name": "CVE-2024-35247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35247"
},
{
"name": "CVE-2024-35857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35857"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2024-36592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36592"
},
{
"name": "CVE-2024-36899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36899"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2024-36923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36923"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36965"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36969",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36969"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2024-36978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36978"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-37078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37078"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2024-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38388"
},
{
"name": "CVE-2024-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38390"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38544"
},
{
"name": "CVE-2024-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38545"
},
{
"name": "CVE-2024-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38546"
},
{
"name": "CVE-2024-38547",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38547"
},
{
"name": "CVE-2024-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38548"
},
{
"name": "CVE-2024-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38550"
},
{
"name": "CVE-2024-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38553"
},
{
"name": "CVE-2024-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38555"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2024-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38568"
},
{
"name": "CVE-2024-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38571"
},
{
"name": "CVE-2024-38573",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38573"
},
{
"name": "CVE-2024-38580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38580"
},
{
"name": "CVE-2024-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38581"
},
{
"name": "CVE-2024-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38590"
},
{
"name": "CVE-2024-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38591"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2024-38597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38597"
},
{
"name": "CVE-2024-38600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38600"
},
{
"name": "CVE-2024-38603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38603"
},
{
"name": "CVE-2024-38605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38605"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2024-38616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38616"
},
{
"name": "CVE-2024-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38619"
},
{
"name": "CVE-2024-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38630"
},
{
"name": "CVE-2024-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38635"
},
{
"name": "CVE-2024-38661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38661"
},
{
"name": "CVE-2024-39301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39301"
},
{
"name": "CVE-2024-39468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39468"
},
{
"name": "CVE-2024-39469",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39469"
},
{
"name": "CVE-2024-39471",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39471"
},
{
"name": "CVE-2021-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47145"
},
{
"name": "CVE-2021-47547",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47547"
},
{
"name": "CVE-2024-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38610"
},
{
"name": "CVE-2024-39475",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39475"
},
{
"name": "CVE-2024-26661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26661"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35970"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38663"
},
{
"name": "CVE-2024-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25741"
},
{
"name": "CVE-2024-36973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36973"
},
{
"name": "CVE-2024-36974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36974"
},
{
"name": "CVE-2024-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38615"
},
{
"name": "CVE-2024-39276",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39276"
},
{
"name": "CVE-2024-39371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39371"
},
{
"name": "CVE-2024-39474",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39474"
},
{
"name": "CVE-2024-39482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39482"
},
{
"name": "CVE-2024-39487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39487"
},
{
"name": "CVE-2024-39488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39488"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39494",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39494"
},
{
"name": "CVE-2024-39496",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39496"
},
{
"name": "CVE-2024-39499",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39499"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-39501",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39501"
},
{
"name": "CVE-2024-39502",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39502"
},
{
"name": "CVE-2024-39505",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39505"
},
{
"name": "CVE-2024-39506",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39506"
},
{
"name": "CVE-2024-39507",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39507"
},
{
"name": "CVE-2024-39509",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39509"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40901"
},
{
"name": "CVE-2024-40902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40902"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40904"
},
{
"name": "CVE-2024-40906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40906"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40911"
},
{
"name": "CVE-2024-40912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40912"
},
{
"name": "CVE-2024-40916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40916"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40927"
},
{
"name": "CVE-2024-40929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40929"
},
{
"name": "CVE-2024-40931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40931"
},
{
"name": "CVE-2024-40932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40932"
},
{
"name": "CVE-2024-40934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40934"
},
{
"name": "CVE-2024-40935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40935"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40941",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40941"
},
{
"name": "CVE-2024-40942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40942"
},
{
"name": "CVE-2024-40943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40943"
},
{
"name": "CVE-2024-40945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40945"
},
{
"name": "CVE-2024-40947",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40947"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40953"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40958"
},
{
"name": "CVE-2024-40959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40959"
},
{
"name": "CVE-2024-40960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40960"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-40967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40967"
},
{
"name": "CVE-2024-40970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40970"
},
{
"name": "CVE-2024-40976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40976"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-40978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40978"
},
{
"name": "CVE-2024-40981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40981"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2024-40987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40987"
},
{
"name": "CVE-2024-40988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40988"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40990"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2024-40995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40995"
},
{
"name": "CVE-2024-41002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41002"
},
{
"name": "CVE-2024-41004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41004"
},
{
"name": "CVE-2024-41006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41006"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52765"
},
{
"name": "CVE-2023-52767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52767"
},
{
"name": "CVE-2023-52768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52768"
},
{
"name": "CVE-2023-52769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52769"
},
{
"name": "CVE-2023-52776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52776"
},
{
"name": "CVE-2023-52780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52780"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52783",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52783"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52801"
},
{
"name": "CVE-2023-52812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52812"
},
{
"name": "CVE-2023-52827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52827"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2023-52836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52836"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52850"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2023-52862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52862"
},
{
"name": "CVE-2023-52863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52863"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2023-52874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52874"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2023-52883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52883"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2024-34777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34777"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36281"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36887"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-36935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36935"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36972"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38384"
},
{
"name": "CVE-2024-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38385"
},
{
"name": "CVE-2024-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38391"
},
{
"name": "CVE-2024-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38539"
},
{
"name": "CVE-2024-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38551"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2024-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38562"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38569"
},
{
"name": "CVE-2024-38570",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38570"
},
{
"name": "CVE-2024-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38572"
},
{
"name": "CVE-2024-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38575"
},
{
"name": "CVE-2024-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38588"
},
{
"name": "CVE-2024-38592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38592"
},
{
"name": "CVE-2024-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38595"
},
{
"name": "CVE-2024-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38602"
},
{
"name": "CVE-2024-38611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38611"
},
{
"name": "CVE-2024-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38617"
},
{
"name": "CVE-2024-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38622"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-38636",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38636"
},
{
"name": "CVE-2024-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38664"
},
{
"name": "CVE-2024-39277",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39277"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-39296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39296"
},
{
"name": "CVE-2024-39362",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39362"
},
{
"name": "CVE-2024-39463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39463"
},
{
"name": "CVE-2024-39466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39466"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2024-36003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36003"
},
{
"name": "CVE-2024-36901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36901"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2024-36912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36912"
},
{
"name": "CVE-2024-36913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36913"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-41011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41011"
},
{
"name": "CVE-2021-47624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47624"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-39472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39472"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2024-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26785"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39473",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39473"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39481",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39481"
},
{
"name": "CVE-2024-39490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39490"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-39504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39504"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-40928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40928"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2024-41017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41017"
},
{
"name": "CVE-2024-41090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41090"
},
{
"name": "CVE-2024-41091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41091"
},
{
"name": "CVE-2016-20022",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20022"
},
{
"name": "CVE-2021-47086",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47086"
},
{
"name": "CVE-2021-47126",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47126"
},
{
"name": "CVE-2021-47186",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47186"
},
{
"name": "CVE-2021-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47291"
},
{
"name": "CVE-2021-47295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47295"
},
{
"name": "CVE-2021-47546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47546"
},
{
"name": "CVE-2021-47588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47588"
},
{
"name": "CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"name": "CVE-2021-47591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47591"
},
{
"name": "CVE-2021-47593",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47593"
},
{
"name": "CVE-2021-47598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47598"
},
{
"name": "CVE-2021-47599",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47599"
},
{
"name": "CVE-2021-47606",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47606"
},
{
"name": "CVE-2021-47622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47622"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48774"
},
{
"name": "CVE-2022-48775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48775"
},
{
"name": "CVE-2022-48776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48776"
},
{
"name": "CVE-2022-48777",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48777"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48788"
},
{
"name": "CVE-2022-48789",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48789"
},
{
"name": "CVE-2022-48790",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48790"
},
{
"name": "CVE-2022-48791",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48791"
},
{
"name": "CVE-2022-48792",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48792"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48794",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48794"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48798",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48798"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48803"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48805"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48807",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48807"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48811"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48814",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48814"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48820",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48820"
},
{
"name": "CVE-2022-48821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48821"
},
{
"name": "CVE-2022-48822",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48822"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48824"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48826"
},
{
"name": "CVE-2022-48827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48827"
},
{
"name": "CVE-2022-48828",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48828"
},
{
"name": "CVE-2022-48829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48829"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48838",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48838"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48841",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48841"
},
{
"name": "CVE-2022-48842",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48842"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48844"
},
{
"name": "CVE-2022-48846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48846"
},
{
"name": "CVE-2022-48847",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48847"
},
{
"name": "CVE-2022-48849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48849"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48851"
},
{
"name": "CVE-2022-48852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48852"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48855",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48855"
},
{
"name": "CVE-2022-48856",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48856"
},
{
"name": "CVE-2022-48857",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48857"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48859",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48859"
},
{
"name": "CVE-2022-48860",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48860"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48862"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-31315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31315"
},
{
"name": "CVE-2023-52573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52573"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-39497",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39497"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2024-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40909"
},
{
"name": "CVE-2024-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40982"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-41012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41012"
},
{
"name": "CVE-2024-41015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41015"
},
{
"name": "CVE-2024-41016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41016"
},
{
"name": "CVE-2024-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41040"
},
{
"name": "CVE-2024-41041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41041"
},
{
"name": "CVE-2024-41044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41044"
},
{
"name": "CVE-2024-41048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41048"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-41059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41059"
},
{
"name": "CVE-2024-41060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41060"
},
{
"name": "CVE-2024-41063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41063"
},
{
"name": "CVE-2024-41064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41064"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2024-41070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41070"
},
{
"name": "CVE-2024-41071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41071"
},
{
"name": "CVE-2024-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41072"
},
{
"name": "CVE-2024-41076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41076"
},
{
"name": "CVE-2024-41078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41078"
},
{
"name": "CVE-2024-41081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41081"
},
{
"name": "CVE-2024-41087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41087"
},
{
"name": "CVE-2024-41089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41089"
},
{
"name": "CVE-2024-41095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41095"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-42093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42093"
},
{
"name": "CVE-2024-42096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42096"
},
{
"name": "CVE-2024-42105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42105"
},
{
"name": "CVE-2024-42119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42119"
},
{
"name": "CVE-2024-42120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42120"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2024-42124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42124"
},
{
"name": "CVE-2024-42145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42145"
},
{
"name": "CVE-2024-42161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42161"
},
{
"name": "CVE-2024-42223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42223"
},
{
"name": "CVE-2024-42224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42224"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
}
],
"initial_release_date": "2024-08-16T00:00:00",
"last_revision_date": "2024-08-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0693",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2911-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242911-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2894-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242894-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2892-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242892-1"
},
{
"published_at": "2024-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2923-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242923-1"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2939-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242939-1"
},
{
"published_at": "2024-08-15",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2929-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242929-1"
},
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2902-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242902-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2895-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242895-1"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2874-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242874-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2896-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242896-1"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2893-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242893-1"
},
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2024:2901-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1"
}
]
}
CERTFR-2021-AVI-934
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | N/A | SUSE MicroOS 5.1 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Realtime 15-SP3 | ||
| SUSE | N/A | SUSE MicroOS 5.0 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Realtime 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE MicroOS 5.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2021-34556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34556"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2020-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2021-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3542"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"name": "CVE-2021-34981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
},
{
"name": "CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"name": "CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"name": "CVE-2021-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
},
{
"name": "CVE-2021-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42252"
},
{
"name": "CVE-2021-35477",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35477"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2018-9517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9517"
},
{
"name": "CVE-2020-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0429"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2021-12-10T00:00:00",
"last_revision_date": "2021-12-10T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-934",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213979-1 du 10 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213979-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213972-1 du 08 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213972-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213978-1 du 09 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213978-1/"
}
]
}
CERTFR-2021-AVI-868
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 16.04 ESM",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 18.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
},
{
"name": "CVE-2021-34556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34556"
},
{
"name": "CVE-2021-3739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3739"
},
{
"name": "CVE-2020-29660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29660"
},
{
"name": "CVE-2020-29661",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29661"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2021-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3428"
},
{
"name": "CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"name": "CVE-2021-3444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3444"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2019-19449",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19449"
},
{
"name": "CVE-2021-35477",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35477"
},
{
"name": "CVE-2021-43056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43056"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2021-11-12T00:00:00",
"last_revision_date": "2021-11-12T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-868",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-11-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service et une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5139-2 du 11 novembre 2021",
"url": "https://ubuntu.com/security/notices/USN-5139-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5140-2 du 11 novembre 2021",
"url": "https://ubuntu.com/security/notices/USN-5140-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu LSN-0082-1 du 11 novembre 2021",
"url": "https://ubuntu.com/security/notices/LSN-0082-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5137-2 du 11 novembre 2021",
"url": "https://ubuntu.com/security/notices/USN-5137-2"
}
]
}
CERTFR-2022-AVI-555
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Basesystem 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3-LTSS | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Development Tools 15-SP3 | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 9 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.2 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Public Cloud 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 12-SP3 | ||
| SUSE | N/A | HPE Helion Openstack 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Legacy Software 15-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP3 | ||
| SUSE | N/A | SUSE OpenStack Cloud 9 | ||
| SUSE | N/A | SUSE OpenStack Cloud 8 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server | ||
| SUSE | N/A | SUSE OpenStack Cloud Crowbar 8 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP3 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP3 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12-SP3 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Availability 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Basesystem 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.2",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Development Tools 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "HPE Helion Openstack 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Legacy Software 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 9",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP3",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12-SP3",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38208"
},
{
"name": "CVE-2018-20784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20784"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0168"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2022-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1972"
},
{
"name": "CVE-2019-19377",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19377"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2021-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39711"
},
{
"name": "CVE-2018-7755",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7755"
},
{
"name": "CVE-2022-20008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20008"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2021-28688",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28688"
},
{
"name": "CVE-2022-1419",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1419"
},
{
"name": "CVE-2022-24448",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24448"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2017-13695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13695"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2021-20292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20292"
},
{
"name": "CVE-2022-21180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
},
{
"name": "CVE-2022-28390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28390"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-06-15T00:00:00",
"last_revision_date": "2022-06-15T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-555",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de SUSE suse-su-20222079- du 14 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222079-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de SUSE suse-su-20222082- du 14 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222082-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de SUSE suse-su-20222080- du 14 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222080-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de SUSE suse-su-20222083- du 14 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222083-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de SUSE suse-su-20222078- du 14 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222078-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de SUSE suse-su-20222077- du 14 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222077-1/"
}
]
}
CERTFR-2022-AVI-567
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Contournement provisoire
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-ESPOS | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.1 | ||
| SUSE | N/A | SUSE Enterprise Storage 7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP2 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.1 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP2-LTSS | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.1 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15-SP2 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Server 15-SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.1",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 7",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.1",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.1",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15-SP2",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n\n## Contournement provisoire\n",
"cves": [
{
"name": "CVE-2021-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38208"
},
{
"name": "CVE-2022-30594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30594"
},
{
"name": "CVE-2022-21127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21127"
},
{
"name": "CVE-2022-1652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1652"
},
{
"name": "CVE-2022-21166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21166"
},
{
"name": "CVE-2022-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0168"
},
{
"name": "CVE-2022-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1975"
},
{
"name": "CVE-2022-21499",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21499"
},
{
"name": "CVE-2022-21125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21125"
},
{
"name": "CVE-2022-1184",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1184"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2022-28893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28893"
},
{
"name": "CVE-2019-19377",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19377"
},
{
"name": "CVE-2021-33061",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33061"
},
{
"name": "CVE-2022-1966",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1966"
},
{
"name": "CVE-2021-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39711"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"name": "CVE-2022-21123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21123"
},
{
"name": "CVE-2022-1734",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1734"
},
{
"name": "CVE-2022-1419",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1419"
},
{
"name": "CVE-2022-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1353"
},
{
"name": "CVE-2017-13695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13695"
},
{
"name": "CVE-2022-1729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1729"
},
{
"name": "CVE-2022-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1158"
},
{
"name": "CVE-2021-20292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20292"
},
{
"name": "CVE-2022-21180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21180"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2020-26541",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26541"
},
{
"name": "CVE-2022-1516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1516"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-06-17T00:00:00",
"last_revision_date": "2022-06-17T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-567",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de SUSE suse-su-20222103-1 du 16 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222103-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 le noyau Linux de SUSE suse-su-20222104-1 du 16 juin 2022",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222104-1/"
}
]
}
CERTFR-2022-AVI-023
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux d'Ubuntu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Ubuntu 21.10",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 21.04",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Ubuntu 20.04 LTS",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"name": "CVE-2021-20321",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20321"
},
{
"name": "CVE-2021-43267",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43267"
},
{
"name": "CVE-2021-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4090"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2021-43056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43056"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2022-01-12T00:00:00",
"last_revision_date": "2022-01-12T00:00:00",
"links": [],
"reference": "CERTFR-2022-AVI-023",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-01-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux\nd\u0027Ubuntu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer\nune ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux d\u0027Ubuntu",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5218-1 du 11 janvier 2022",
"url": "https://ubuntu.com/security/notices/USN-5218-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5217-1 du 11 janvier 2022",
"url": "https://ubuntu.com/security/notices/USN-5217-1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-5219-1 du 11 janvier 2022",
"url": "https://ubuntu.com/security/notices/USN-5219-1"
}
]
}
CERTFR-2021-AVI-904
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service, une atteinte à l'intégrité des données et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP3",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Public Cloud 15-SP2",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-34981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2021-11-26T00:00:00",
"last_revision_date": "2021-11-26T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-904",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-11-26T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nd\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es et une atteinte\n\u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213807-1 du 25 novembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213807-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213806-1 du 25 novembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213806-1/"
}
]
}
CERTFR-2021-AVI-916
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Linux Enterprise Debuginfo 11-SP4 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-SP4-LTSS | ||
| SUSE | N/A | SUSE CaaS Platform 4.0 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS | ||
| SUSE | N/A | SUSE Linux Enterprise Software Development Kit 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP 15-SP1 | ||
| SUSE | N/A | SUSE Linux Enterprise Module for Live Patching 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-BCL | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15-SP1-LTSS | ||
| SUSE | N/A | SUSE Enterprise Storage 6 | ||
| SUSE | N/A | SUSE Linux Enterprise High Availability 15-SP1 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 11-EXTRA | ||
| SUSE | N/A | SUSE Linux Enterprise Workstation Extension 12-SP5 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Debuginfo 11-SP4",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE CaaS Platform 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Software Development Kit 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP 15-SP1",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Module for Live Patching 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15-SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Enterprise Storage 6",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability 15-SP1",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 11-EXTRA",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 12-SP5",
"product": {
"name": "N/A",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"name": "CVE-2021-3655",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3655"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2021-34556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34556"
},
{
"name": "CVE-2021-3679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3679"
},
{
"name": "CVE-2020-3702",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3702"
},
{
"name": "CVE-2020-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4788"
},
{
"name": "CVE-2019-3874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3874"
},
{
"name": "CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"name": "CVE-2021-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38204"
},
{
"name": "CVE-2020-36385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36385"
},
{
"name": "CVE-2014-7841",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7841"
},
{
"name": "CVE-2021-3542",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3542"
},
{
"name": "CVE-2021-31916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31916"
},
{
"name": "CVE-2021-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38160"
},
{
"name": "CVE-2021-3760",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3760"
},
{
"name": "CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2021-3659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3659"
},
{
"name": "CVE-2021-34981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34981"
},
{
"name": "CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"name": "CVE-2018-13405",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13405"
},
{
"name": "CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"name": "CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"name": "CVE-2021-3656",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3656"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"name": "CVE-2021-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3640"
},
{
"name": "CVE-2021-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38198"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2021-33909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33909"
},
{
"name": "CVE-2021-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3715"
},
{
"name": "CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"name": "CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"name": "CVE-2019-3900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3900"
},
{
"name": "CVE-2021-20265",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20265"
},
{
"name": "CVE-2021-37576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37576"
},
{
"name": "CVE-2021-3732",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3732"
},
{
"name": "CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"name": "CVE-2021-42008",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42008"
},
{
"name": "CVE-2021-42252",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42252"
},
{
"name": "CVE-2021-35477",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35477"
},
{
"name": "CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"name": "CVE-2021-33033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33033"
},
{
"name": "CVE-2018-9517",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9517"
},
{
"name": "CVE-2020-0429",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0429"
},
{
"name": "CVE-2021-3653",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3653"
},
{
"name": "CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
}
],
"initial_release_date": "2021-12-03T00:00:00",
"last_revision_date": "2021-12-03T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-916",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de\nSUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un\nprobl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, un d\u00e9ni de service \u00e0\ndistance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-202114849-1 du 01 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114849-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213877-1 du 01 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213877-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213876-1 du 01 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213876-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 SUSE suse-su-20213848-1 du 01 d\u00e9cembre 2021",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213848-1/"
}
]
}
suse-su-2022:1686-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018).\n- CVE-2022-28356: Fixed a refcount leak bug found in net/llc/af_llc.c (bnc#1197391).\n- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).\n- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).\n- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516).\n- CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914).\n- CVE-2022-1011: Fixed a use-after-free flaw inside the FUSE filesystem in the way a user triggers write(). This flaw allowed a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation (bnc#1197343).\n- CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).\n- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).\n- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).\n- CVE-2019-20811: Fixed issue in rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, where a reference count is mishandled (bnc#1172456).\n- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).\n\n\nThe following non-security bugs were fixed:\n\n- IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() (git-fixes)\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NFSv4: recover from pre-mature loss of openstateid (bsc#1196247).\n- NFSv4: Do not try to CLOSE if the stateid \u0027other\u0027 field has changed (bsc#1196247).\n- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (bsc#1196247).\n- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1196247).\n- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1196247).\n- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).\n- PCI/switchtec: Read all 64 bits of part_event_bitmap (git-fixes).\n- PCI: Add device even if driver attach failed (git-fixes).\n- PCI: Fix overflow in command-line resource alignment requests (git-fixes).\n- PCI: iproc: Fix out-of-bound array accesses (git-fixes).\n- PCI: iproc: Set affinity mask on MSI interrupts (git-fixes).\n- PCI: qcom: Change duplicate PCI reset to phy reset (git-fixes).\n- PCI: qcom: Make sure PCIe is reset before init for rev 2.1.0 (git-fixes).\n- RDMA/rxe: Missing unlock on error in get_srq_wqe() (git-fixes)\n- RDMA/rxe: Restore setting tot_len in the IPv4 header (git-fixes)\n- RDMA/rxe: Use the correct size of wqe when processing SRQ (git-fixes)\n- SUNRPC: Handle low memory situations in call_status() (git-fixes).\n- USB: Fix \u0027slab-out-of-bounds Write\u0027 bug in usb_hcd_poll_rh_status (git-fixes).\n- USB: core: Fix bug in resuming hub\u0027s handling of wakeup requests (git-fixes).\n- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- USB: serial: pl2303: add IBM device IDs (git-fixes).\n- USB: serial: simple: add Nokia phone driver (git-fixes).\n- USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).\n- arm64: cmpxchg: Use \u0027K\u0027 instead of \u0027L\u0027 for ll/sc immediate constraint (git-fixes)\n- arm64: compat: Provide definition for COMPAT_SIGMINSTKSZ (git-fixes)\n- arm64: drop linker script hack to hide __efistub_ symbols (git-fixes)\n- arm64: fix for bad_mode() handler to always result in panic (git-fixes)\n- arm64: hibernate: Clean the __hyp_text to PoC after resume (git-fixes)\n- arm64: hyp-stub: Forbid kprobing of the hyp-stub (git-fixes)\n- arm64: kaslr: ensure randomized quantities are clean also when kaslr (git-fixes)\n- arm64: kaslr: ensure randomized quantities are clean to the PoC (git-fixes)\n- arm64: kprobe: Always blacklist the KVM world-switch code (git-fixes)\n- arm64: only advance singlestep for user instruction traps (git-fixes)\n- arm64: relocatable: fix inconsistencies in linker script and options (git-fixes)\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- backlight: pwm_bl: Improve bootloader/kernel device handover (bsc#1129770)\n- bnx2x: fix napi API usage sequence (bsc#1198217).\n- can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB data (git-fixes).\n- char/mwave: Adjust io port register size (git-fixes).\n- cifs: do not skip link targets when an I/O fails (bsc#1194625).\n- crypto: arm64/aes-ce-cipher - move assembler code to .S file (git-fixes)\n- fbmem: do not allow too huge resolutions (bsc#1129770)\n- fix parallelism for rpc tasks (bsc#1197663).\n- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).\n- fsl/fman: Check for null pointer after calling devm_ioremap (git-fixes).\n- hwrng: atmel - disable trng on failure path (git-fixes).\n- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).\n- i40e: Fix incorrect netdev\u0027s real number of RX/TX queues (git-fixes).\n- i40e: add correct exception tracing for XDP (git-fixes).\n- i40e: optimize for XDP_REDIRECT in xsk path (git-fixes).\n- ieee802154: atusb: fix uninit value in atusb_set_extended_addr (git-fixes).\n- io-64-nonatomic: add io{read|write}64{_lo_hi|_hi_lo} macros (git-fixes).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).\n- mac80211: mesh: fix potentially unaligned access (git-fixes).\n- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).\n- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: fix memory leak in em28xx_init_dev (git-fixes).\n- media: lmedm04: Fix misuse of comma (git-fixes).\n- media: rc-loopback: return number of emitters rather than error (git-fixes).\n- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).\n- media: uvc: do not do DMA on stack (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).\n- mt7601u: fix rx buffer refcounting (git-fixes).\n- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- mxser: fix xmit_buf leak in activate when LSR == 0xff (git-fixes).\n- net/mlx5e: Reduce tc unsupported key print level (git-fixes).\n- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).\n- net: ethernet: mtk_eth_soc: fix return values and refactor MDIO ops (git-fixes).\n- net: rtlwifi: properly check for alloc_workqueue() failure (git-fixes).\n- net: stmicro: handle clk_prepare() failure during init (git-fixes).\n- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).\n- parisc/sticon: fix reverse colors (bsc#1129770)\n- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).\n- ppp: ensure minimum packet size in ppp_write() (git-fixes).\n- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).\n- random: check for signal_pending() outside of need_resched() check (git-fixes).\n- random: fix data race on crng_node_pool (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).\n- scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825).\n- tcp: Fix potential use-after-free due to double kfree() (bsc#1197075).\n- tcp: fix race condition when creating child sockets from syncookies (bsc#1197075).\n- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).\n- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (bsc#1129770)\n- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (bsc#1129770)\n- video: fbdev: chipsfb: use memset_io() instead of memset() (bsc#1129770)\n- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (bsc#1129770)\n- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (bsc#1129770)\n- video: fbdev: sm712fb: Fix crash in smtcfb_read() (bsc#1129770)\n- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (bsc#1129770)\n- video: fbdev: udlfb: properly check endpoint type (bsc#1129770)\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- x86/pm: Save the MSR validity status at context setup (bsc#1114648).\n- x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1114648).\n- xen/blkfront: fix comment for need_copy (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xen: fix is_xen_pmu() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-1686,SUSE-SLE-HA-12-SP5-2022-1686,SUSE-SLE-Live-Patching-12-SP5-2022-1686,SUSE-SLE-SDK-12-SP5-2022-1686,SUSE-SLE-SERVER-12-SP5-2022-1686,SUSE-SLE-WE-12-SP5-2022-1686",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1686-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:1686-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221686-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:1686-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html"
},
{
"category": "self",
"summary": "SUSE Bug 1028340",
"url": "https://bugzilla.suse.com/1028340"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1084513",
"url": "https://bugzilla.suse.com/1084513"
},
{
"category": "self",
"summary": "SUSE Bug 1114648",
"url": "https://bugzilla.suse.com/1114648"
},
{
"category": "self",
"summary": "SUSE Bug 1121726",
"url": "https://bugzilla.suse.com/1121726"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1137728",
"url": "https://bugzilla.suse.com/1137728"
},
{
"category": "self",
"summary": "SUSE Bug 1172456",
"url": "https://bugzilla.suse.com/1172456"
},
{
"category": "self",
"summary": "SUSE Bug 1183723",
"url": "https://bugzilla.suse.com/1183723"
},
{
"category": "self",
"summary": "SUSE Bug 1187055",
"url": "https://bugzilla.suse.com/1187055"
},
{
"category": "self",
"summary": "SUSE Bug 1191647",
"url": "https://bugzilla.suse.com/1191647"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1194625",
"url": "https://bugzilla.suse.com/1194625"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1196247",
"url": "https://bugzilla.suse.com/1196247"
},
{
"category": "self",
"summary": "SUSE Bug 1197075",
"url": "https://bugzilla.suse.com/1197075"
},
{
"category": "self",
"summary": "SUSE Bug 1197343",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "self",
"summary": "SUSE Bug 1197391",
"url": "https://bugzilla.suse.com/1197391"
},
{
"category": "self",
"summary": "SUSE Bug 1197663",
"url": "https://bugzilla.suse.com/1197663"
},
{
"category": "self",
"summary": "SUSE Bug 1197888",
"url": "https://bugzilla.suse.com/1197888"
},
{
"category": "self",
"summary": "SUSE Bug 1197914",
"url": "https://bugzilla.suse.com/1197914"
},
{
"category": "self",
"summary": "SUSE Bug 1198217",
"url": "https://bugzilla.suse.com/1198217"
},
{
"category": "self",
"summary": "SUSE Bug 1198413",
"url": "https://bugzilla.suse.com/1198413"
},
{
"category": "self",
"summary": "SUSE Bug 1198516",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "self",
"summary": "SUSE Bug 1198687",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "self",
"summary": "SUSE Bug 1198742",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "self",
"summary": "SUSE Bug 1198825",
"url": "https://bugzilla.suse.com/1198825"
},
{
"category": "self",
"summary": "SUSE Bug 1198989",
"url": "https://bugzilla.suse.com/1198989"
},
{
"category": "self",
"summary": "SUSE Bug 1199012",
"url": "https://bugzilla.suse.com/1199012"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7755 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20292 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20321 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38208 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1011 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1280 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1353 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1419 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1516 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28356 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-05-16T11:56:14Z",
"generator": {
"date": "2022-05-16T11:56:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:1686-1",
"initial_release_date": "2022-05-16T11:56:14Z",
"revision_history": [
{
"date": "2022-05-16T11:56:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.121.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.121.2.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.121.2.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.121.2.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.121.2.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.121.2.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.121.2.aarch64",
"product_id": "kernel-default-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.121.2.aarch64",
"product_id": "kernel-default-base-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.121.2.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.121.2.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.121.2.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.121.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.121.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.121.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.121.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.121.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.121.2.aarch64",
"product_id": "kernel-syms-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.121.2.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.121.2.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.121.2.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.121.2.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.121.2.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.121.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.121.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.121.2.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.121.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.121.2.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.121.2.noarch",
"product_id": "kernel-devel-4.12.14-122.121.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.121.2.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.121.2.noarch",
"product_id": "kernel-docs-4.12.14-122.121.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.121.2.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.121.2.noarch",
"product_id": "kernel-docs-html-4.12.14-122.121.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.121.2.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.121.2.noarch",
"product_id": "kernel-macros-4.12.14-122.121.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.121.2.noarch",
"product": {
"name": "kernel-source-4.12.14-122.121.2.noarch",
"product_id": "kernel-source-4.12.14-122.121.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.121.2.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.121.2.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.121.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-debug-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-default-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.121.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.121.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.121.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.121.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.121.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.121.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-syms-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.121.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.121.2.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.121.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.121.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.121.2.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.121.2.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.121.2.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.121.2.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-default-4.12.14-122.121.2.s390x",
"product_id": "kernel-default-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.121.2.s390x",
"product_id": "kernel-default-base-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.121.2.s390x",
"product_id": "kernel-default-devel-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.121.2.s390x",
"product_id": "kernel-default-extra-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.121.2.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.121.2.s390x",
"product_id": "kernel-default-man-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.121.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.121.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.121.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.121.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.121.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.121.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.121.2.s390x",
"product_id": "kernel-syms-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.121.2.s390x",
"product_id": "kernel-vanilla-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.121.2.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.121.2.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.121.2.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.121.2.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.121.2.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"product_id": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.121.2.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.121.2.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.121.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.121.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.121.2.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.121.2.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.121.2.x86_64",
"product_id": "kernel-debug-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.121.2.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.121.2.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.121.2.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.121.2.x86_64",
"product_id": "kernel-default-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.121.2.x86_64",
"product_id": "kernel-default-base-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.121.2.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.121.2.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.121.2.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.121.2.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.121.2.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.121.2.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.121.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.121.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.121.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.121.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.121.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.121.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.121.2.x86_64",
"product_id": "kernel-syms-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.121.2.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.121.2.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.121.2.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"product_id": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.121.2.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.121.2.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.121.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.121.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.121.2.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.121.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.121.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.121.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.121.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.121.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.121.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.121.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.121.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.121.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-default-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.121.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.121.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.121.2.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.121.2.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.121.2.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch"
},
"product_reference": "kernel-source-4.12.14-122.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.121.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.121.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-default-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.121.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.121.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.121.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.121.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.121.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch"
},
"product_reference": "kernel-source-4.12.14-122.121.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.121.2.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.121.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.121.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.121.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.121.2.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.121.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.121.2.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.121.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7755"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7755",
"url": "https://www.suse.com/security/cve/CVE-2018-7755"
},
{
"category": "external",
"summary": "SUSE Bug 1084513 for CVE-2018-7755",
"url": "https://bugzilla.suse.com/1084513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "low"
}
],
"title": "CVE-2018-7755"
},
{
"cve": "CVE-2019-20811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20811"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20811",
"url": "https://www.suse.com/security/cve/CVE-2019-20811"
},
{
"category": "external",
"summary": "SUSE Bug 1172456 for CVE-2019-20811",
"url": "https://bugzilla.suse.com/1172456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2019-20811"
},
{
"cve": "CVE-2021-20292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20292"
}
],
"notes": [
{
"category": "general",
"text": "There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20292",
"url": "https://www.suse.com/security/cve/CVE-2021-20292"
},
{
"category": "external",
"summary": "SUSE Bug 1183723 for CVE-2021-20292",
"url": "https://bugzilla.suse.com/1183723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2021-20292"
},
{
"cve": "CVE-2021-20321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20321"
}
],
"notes": [
{
"category": "general",
"text": "A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20321",
"url": "https://www.suse.com/security/cve/CVE-2021-20321"
},
{
"category": "external",
"summary": "SUSE Bug 1191647 for CVE-2021-20321",
"url": "https://bugzilla.suse.com/1191647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2021-20321"
},
{
"cve": "CVE-2021-38208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38208"
}
],
"notes": [
{
"category": "general",
"text": "net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38208",
"url": "https://www.suse.com/security/cve/CVE-2021-38208"
},
{
"category": "external",
"summary": "SUSE Bug 1187055 for CVE-2021-38208",
"url": "https://bugzilla.suse.com/1187055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2021-38208"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2022-1011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1011"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1011",
"url": "https://www.suse.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "SUSE Bug 1197343 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "external",
"summary": "SUSE Bug 1197344 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197344"
},
{
"category": "external",
"summary": "SUSE Bug 1198687 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212322 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1212322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-1280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1280"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1280",
"url": "https://www.suse.com/security/cve/CVE-2022-1280"
},
{
"category": "external",
"summary": "SUSE Bug 1197914 for CVE-2022-1280",
"url": "https://bugzilla.suse.com/1197914"
},
{
"category": "external",
"summary": "SUSE Bug 1198590 for CVE-2022-1280",
"url": "https://bugzilla.suse.com/1198590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-1280"
},
{
"cve": "CVE-2022-1353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1353"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1353",
"url": "https://www.suse.com/security/cve/CVE-2022-1353"
},
{
"category": "external",
"summary": "SUSE Bug 1198516 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "external",
"summary": "SUSE Bug 1212293 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1212293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1419"
}
],
"notes": [
{
"category": "general",
"text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1419",
"url": "https://www.suse.com/security/cve/CVE-2022-1419"
},
{
"category": "external",
"summary": "SUSE Bug 1198742 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "external",
"summary": "SUSE Bug 1201655 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1201655"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-1419"
},
{
"cve": "CVE-2022-1516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1516"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1516",
"url": "https://www.suse.com/security/cve/CVE-2022-1516"
},
{
"category": "external",
"summary": "SUSE Bug 1199012 for CVE-2022-1516",
"url": "https://bugzilla.suse.com/1199012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-28356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28356"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28356",
"url": "https://www.suse.com/security/cve/CVE-2022-28356"
},
{
"category": "external",
"summary": "SUSE Bug 1197391 for CVE-2022-28356",
"url": "https://bugzilla.suse.com/1197391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "moderate"
}
],
"title": "CVE-2022-28356"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_121-default-1-8.5.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.121.2.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.121.2.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.121.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.121.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T11:56:14Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
}
]
}
suse-su-2021:3933-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n\nThe following non-security bugs were fixed:\n\n- ABI: sysfs-kernel-slab: Document some stats (git-fixes).\n- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).\n- ALSA: ua101: fix division by zero at probe (git-fixes).\n- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).\n- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).\n- ASoC: cs42l42: Correct some register default values (git-fixes).\n- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).\n- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).\n- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).\n- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).\n- ASoC: rockchip: Use generic dmaengine code (git-fixes).\n- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).\n- ath10k: fix control-message timeout (git-fixes).\n- ath10k: fix division by zero in send path (git-fixes).\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).\n- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).\n- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).\n- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).\n- bpf: Fix potential race in tail call compatibility check (git-fixes).\n- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).\n- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).\n- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).\n- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).\n- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).\n- config: disable unprivileged BPF by default (jsc#SLE-22573)\n- crypto: caam - disable pkc for non-E SoCs (git-fixes).\n- crypto: qat - detect PFVF collision after ACK (git-fixes).\n- crypto: qat - disregard spurious PFVF interrupts (git-fixes).\n- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).\n- drm/amdgpu: fix warning for overflow check (git-fixes).\n- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).\n- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).\n- drm/v3d: fix wait for TMU write combiner flush (git-fixes).\n- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).\n- exfat: fix erroneous discard when clear cluster bit (git-fixes).\n- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).\n- exfat: properly set s_time_gran (bsc#1192328).\n- exfat: truncate atimes to 2s granularity (bsc#1192328).\n- firmware/psci: fix application of sizeof to pointer (git-fixes).\n- fuse: fix page stealing (bsc#1192718).\n- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).\n- gpio: mpc8xxx: Use \u0027devm_gpiochip_add_data()\u0027 to simplify the code and avoid a leak (git-fixes).\n- HID: u2fzero: clarify error check and length calculations (git-fixes).\n- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).\n- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).\n- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).\n- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).\n- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).\n- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).\n- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).\n- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).\n- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).\n- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).\n- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).\n- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).\n- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).\n- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).\n- KVM: s390: index kvm-\u003earch.idle_mask by vcpu_idx (bsc#1133021).\n- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).\n- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- media: cedrus: Fix SUNXI tile size calculation (git-fixes).\n- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).\n- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).\n- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: add missing em28xx_close_extension (git-fixes).\n- media: em28xx: Do not use ops-\u003esuspend if it is NULL (git-fixes).\n- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).\n- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).\n- media: mtk-vpu: Fix a resource leak in the error handling path of \u0027mtk_vpu_probe()\u0027 (git-fixes).\n- media: mxl111sf: change mutex_init() location (git-fixes).\n- media: radio-wl1273: Avoid card name truncation (git-fixes).\n- media: si470x: Avoid card name truncation (git-fixes).\n- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).\n- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).\n- media: tm6000: Avoid card name truncation (git-fixes).\n- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).\n- memstick: avoid out-of-range warning (git-fixes).\n- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).\n- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).\n- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).\n- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).\n- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).\n- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).\n- mwifiex: fix division by zero in fw download path (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).\n- net: mscc: ocelot: fix hardware timestamp dequeue logic.\n- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).\n- nvme-pci: set min_align_mask (bsc#1191851).\n- ocfs2: do not zero pages beyond i_size (bsc#1190795).\n- ocfs2: fix data corruption on truncate (bsc#1190795).\n- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).\n- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).\n- PCI: aardvark: Do not unmask unused interrupts (git-fixes).\n- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).\n- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).\n- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).\n- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).\n- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).\n- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).\n- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).\n- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).\n- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).\n- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).\n- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).\n- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).\n- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).\n- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).\n- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).\n- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).\n- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).\n- power: supply: rt5033 battery: Change voltage values to ca 5V (git-fixes).\n- printk/console: Allow to disable console output by using console=\u0027\u0027 or console=null (bsc#1192753).\n- printk: handle blank console arguments passed in (bsc#1192753).\n- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).\n- r8152: add a helper function about setting EEE (git-fixes).\n- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).\n- r8152: Disable PLA MCU clock speed down (git-fixes).\n- r8152: disable U2P3 for RTL8153B (git-fixes).\n- r8152: divide the tx and rx bottom functions (git-fixes).\n- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).\n- r8152: fix runtime resume for linking change (git-fixes).\n- r8152: replace array with linking list for rx information (git-fixes).\n- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).\n- r8152: saving the settings of EEE (git-fixes).\n- r8152: separate the rx buffer size (git-fixes).\n- r8152: use alloc_pages for rx buffer (git-fixes).\n- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).\n- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).\n- Revert \u0027ibmvnic: check failover_pending in login response\u0027 (bsc#1190523 ltc#194510).\n- Revert \u0027platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes\u0027 (git-fixes).\n- Revert \u0027r8152: adjust the settings about MAC clock speed down for RTL8153\u0027 (git-fixes).\n- Revert \u0027scsi: ufs: fix a missing check of devm_reset_control_get\u0027 (git-fixes).\n- Revert \u0027x86/kvm: fix vcpu-id indexed array sizes\u0027 (git-fixes).\n- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).\n- rsi: fix control-message timeout (git-fixes).\n- rsi: Fix module dev_oper_mode parameter description (git-fixes).\n- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- s390/qeth: fix deadlock during failing recovery (git-fixes).\n- s390/qeth: Fix deadlock in remove_discipline (git-fixes).\n- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).\n- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).\n- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).\n- scsi: core: Fix spelling in a source code comment (git-fixes).\n- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).\n- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).\n- scsi: dc395: Fix error case unwinding (git-fixes).\n- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).\n- scsi: FlashPoint: Rename si_flags field (git-fixes).\n- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).\n- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).\n- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).\n- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).\n- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).\n- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).\n- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).\n- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).\n- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).\n- scsi: snic: Fix an error message (git-fixes).\n- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).\n- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).\n- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).\n- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).\n- staging: r8712u: fix control-message timeout (git-fixes).\n- staging: rtl8192u: fix control-message timeouts (git-fixes).\n- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).\n- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).\n- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).\n- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).\n- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).\n- swiotlb: factor out a nr_slots helper (bsc#1191851).\n- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).\n- swiotlb: respect min_align_mask (bsc#1191851).\n- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).\n- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).\n- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- usb: gadget: hid: fix error code in do_config() (git-fixes).\n- usb: iowarrior: fix control-message timeouts (git-fixes).\n- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).\n- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).\n- usbnet: fix error return code in usbnet_probe() (git-fixes).\n- usbnet: sanity check for maxpacket (git-fixes).\n- usb: serial: keyspan: fix memleak on probe errors (git-fixes).\n- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).\n- virtio-gpu: fix possible memory allocation failure (git-fixes).\n- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two\u0027s complement (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1152489).\n- x86/msi: Force affinity setup before startup (bsc#1152489).\n- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).\n- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).\n- xen: Fix implicit type conversion (git-fixes).\n- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).\n- xfs: do not allow log writes if the data device is readonly (bsc#1192229).\n- zram-avoid-race-between-zram_remove-and-disksize_sto.patch: (bsc#1170269).\n- zram-don-t-fail-to-remove-zram-during-unloading-modu.patch: (bsc#1170269).\n- zram-fix-race-between-zram_reset_device-and-disksize.patch: (bsc#1170269).\n- zram-replace-fsync_bdev-with-sync_blockdev.patch: (bsc#1170269).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3933,SUSE-SLE-Module-Basesystem-15-SP2-2021-3933,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3933,SUSE-SLE-Module-Legacy-15-SP2-2021-3933,SUSE-SLE-Module-Live-Patching-15-SP2-2021-3933,SUSE-SLE-Product-HA-15-SP2-2021-3933,SUSE-SLE-Product-WE-15-SP2-2021-3933,SUSE-SUSE-MicroOS-5.0-2021-3933",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3933-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3933-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213933-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3933-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1169263",
"url": "https://bugzilla.suse.com/1169263"
},
{
"category": "self",
"summary": "SUSE Bug 1170269",
"url": "https://bugzilla.suse.com/1170269"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1190523",
"url": "https://bugzilla.suse.com/1190523"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191851",
"url": "https://bugzilla.suse.com/1191851"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1191980",
"url": "https://bugzilla.suse.com/1191980"
},
{
"category": "self",
"summary": "SUSE Bug 1192045",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "self",
"summary": "SUSE Bug 1192229",
"url": "https://bugzilla.suse.com/1192229"
},
{
"category": "self",
"summary": "SUSE Bug 1192273",
"url": "https://bugzilla.suse.com/1192273"
},
{
"category": "self",
"summary": "SUSE Bug 1192328",
"url": "https://bugzilla.suse.com/1192328"
},
{
"category": "self",
"summary": "SUSE Bug 1192718",
"url": "https://bugzilla.suse.com/1192718"
},
{
"category": "self",
"summary": "SUSE Bug 1192740",
"url": "https://bugzilla.suse.com/1192740"
},
{
"category": "self",
"summary": "SUSE Bug 1192745",
"url": "https://bugzilla.suse.com/1192745"
},
{
"category": "self",
"summary": "SUSE Bug 1192750",
"url": "https://bugzilla.suse.com/1192750"
},
{
"category": "self",
"summary": "SUSE Bug 1192753",
"url": "https://bugzilla.suse.com/1192753"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE Bug 1192802",
"url": "https://bugzilla.suse.com/1192802"
},
{
"category": "self",
"summary": "SUSE Bug 1192896",
"url": "https://bugzilla.suse.com/1192896"
},
{
"category": "self",
"summary": "SUSE Bug 1192906",
"url": "https://bugzilla.suse.com/1192906"
},
{
"category": "self",
"summary": "SUSE Bug 1192918",
"url": "https://bugzilla.suse.com/1192918"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0941 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-12-06T10:35:54Z",
"generator": {
"date": "2021-12-06T10:35:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3933-1",
"initial_release_date": "2021-12-06T10:35:54Z",
"revision_history": [
{
"date": "2021-12-06T10:35:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.96.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.96.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.96.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.96.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.96.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.96.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.96.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.96.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-24.96.1.aarch64",
"product_id": "kernel-default-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"product_id": "kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-24.96.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-24.96.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.96.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-24.96.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.96.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-24.96.1.aarch64",
"product_id": "kernel-preempt-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.96.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.96.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.96.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-24.96.1.aarch64",
"product_id": "kernel-syms-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.96.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.96.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.96.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.96.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.96.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.96.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-24.96.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.96.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.96.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.96.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-24.96.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-24.96.1.noarch",
"product_id": "kernel-devel-5.3.18-24.96.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-24.96.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-24.96.1.noarch",
"product_id": "kernel-docs-5.3.18-24.96.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-24.96.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-24.96.1.noarch",
"product_id": "kernel-docs-html-5.3.18-24.96.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-24.96.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-24.96.1.noarch",
"product_id": "kernel-macros-5.3.18-24.96.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-24.96.1.noarch",
"product": {
"name": "kernel-source-5.3.18-24.96.1.noarch",
"product_id": "kernel-source-5.3.18-24.96.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-24.96.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-24.96.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-24.96.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-debug-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-default-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-24.96.1.ppc64le",
"product_id": "kernel-syms-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.96.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.96.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-24.96.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-24.96.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.96.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-24.96.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.96.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.96.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.96.1.s390x",
"product": {
"name": "kernel-default-5.3.18-24.96.1.s390x",
"product_id": "kernel-default-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"product_id": "kernel-default-base-5.3.18-24.96.1.9.44.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.96.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-24.96.1.s390x",
"product_id": "kernel-default-devel-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.96.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-24.96.1.s390x",
"product_id": "kernel-default-extra-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.96.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.96.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.96.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-24.96.1.s390x",
"product_id": "kernel-obs-build-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.96.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-24.96.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.96.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-24.96.1.s390x",
"product_id": "kernel-syms-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-24.96.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-24.96.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.96.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.96.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-24.96.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-24.96.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-24.96.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-24.96.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-24.96.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-24.96.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-24.96.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-24.96.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-24.96.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-24.96.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-24.96.1.x86_64",
"product_id": "kernel-debug-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-24.96.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-24.96.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-24.96.1.x86_64",
"product_id": "kernel-default-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"product_id": "kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-24.96.1.9.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-24.96.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-24.96.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-24.96.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-24.96.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-24.96.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-24_96-preempt-1-5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-24_96-preempt-1-5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-24_96-preempt-1-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-24.96.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-24.96.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-24.96.1.x86_64",
"product_id": "kernel-preempt-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-24.96.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-24.96.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-24.96.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-24.96.1.x86_64",
"product_id": "kernel-syms-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-24.96.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-24.96.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-24.96.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-24.96.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-24.96.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-24.96.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-24.96.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-24.96.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-24.96.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-24.96.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x"
},
"product_reference": "kernel-default-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-24.96.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-24.96.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-24.96.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-24.96.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-24.96.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-24.96.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-24.96.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch"
},
"product_reference": "kernel-source-5.3.18-24.96.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.96.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.96.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP2",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.96.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-24.96.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-24.96.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-24.96.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0941"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0941",
"url": "https://www.suse.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "SUSE Bug 1192045 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "external",
"summary": "SUSE Bug 1192048 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T10:35:54Z",
"details": "important"
}
],
"title": "CVE-2021-0941"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T10:35:54Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T10:35:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T10:35:54Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T10:35:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-24_96-default-1-5.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-base-5.3.18-24.96.1.9.44.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-default-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-devel-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-macros-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:kernel-preempt-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-docs-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-obs-build-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-preempt-devel-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-source-5.3.18-24.96.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:kernel-syms-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP2:reiserfs-kmp-default-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-default-extra-5.3.18-24.96.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP2:kernel-preempt-extra-5.3.18-24.96.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T10:35:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
suse-su-2022:1651-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).\n- CVE-2019-20811: Fixed issue in rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, where a reference count is mishandled (bnc#1172456).\n- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).\n- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).\n- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).\n- CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2022-1011: Fixed a use-after-free flaw inside the FUSE filesystem in the way a user triggers write(). This flaw allowed a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation (bnc#1197343).\n- CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914).\n- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516).\n- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).\n- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).\n- CVE-2022-23960: Fixed speculation issues in the Branch History Buffer that allowed an attacker to obtain sensitive information using cache allocation (bnc#1196657).\n- CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018).\n\nThe following non-security bugs were fixed:\n\n- IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() (git-fixes)\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NFSv4: recover from pre-mature loss of openstateid (bsc#1196247).\n- NFSv4: Do not try to CLOSE if the stateid \u0027other\u0027 field has changed (bsc#1196247).\n- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (bsc#1196247).\n- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1196247).\n- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1196247).\n- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).\n- PCI/switchtec: Read all 64 bits of part_event_bitmap (git-fixes).\n- PCI: Add device even if driver attach failed (git-fixes).\n- PCI: Fix overflow in command-line resource alignment requests (git-fixes).\n- PCI: iproc: Fix out-of-bound array accesses (git-fixes).\n- PCI: iproc: Set affinity mask on MSI interrupts (git-fixes).\n- PCI: qcom: Change duplicate PCI reset to phy reset (git-fixes).\n- PCI: qcom: Make sure PCIe is reset before init for rev 2.1.0 (git-fixes).\n- RDMA/rxe: Missing unlock on error in get_srq_wqe() (git-fixes)\n- RDMA/rxe: Restore setting tot_len in the IPv4 header (git-fixes)\n- RDMA/rxe: Use the correct size of wqe when processing SRQ (git-fixes)\n- SUNRPC: Handle low memory situations in call_status() (git-fixes).\n- USB: Fix \u0027slab-out-of-bounds Write\u0027 bug in usb_hcd_poll_rh_status (git-fixes).\n- USB: core: Fix bug in resuming hub\u0027s handling of wakeup requests (git-fixes).\n- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- USB: serial: pl2303: add IBM device IDs (git-fixes).\n- USB: serial: simple: add Nokia phone driver (git-fixes).\n- USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).\n- arm64: cmpxchg: Use \u0027K\u0027 instead of \u0027L\u0027 for ll/sc immediate constraint (git-fixes)\n- arm64: compat: Provide definition for COMPAT_SIGMINSTKSZ (git-fixes)\n- arm64: drop linker script hack to hide __efistub_ symbols (git-fixes)\n- arm64: fix for bad_mode() handler to always result in panic (git-fixes)\n- arm64: hibernate: Clean the __hyp_text to PoC after resume (git-fixes)\n- arm64: hyp-stub: Forbid kprobing of the hyp-stub (git-fixes)\n- arm64: kaslr: ensure randomized quantities are clean also when kaslr (git-fixes)\n- arm64: kaslr: ensure randomized quantities are clean to the PoC (git-fixes)\n- arm64: kprobe: Always blacklist the KVM world-switch code (git-fixes)\n- arm64: only advance singlestep for user instruction traps (git-fixes)\n- arm64: relocatable: fix inconsistencies in linker script and options (git-fixes)\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- backlight: pwm_bl: Improve bootloader/kernel device handover (bsc#1129770)\n- bnx2x: fix napi API usage sequence (bsc#1198217).\n- can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB data (git-fixes).\n- char/mwave: Adjust io port register size (git-fixes).\n- cifs: do not skip link targets when an I/O fails (bsc#1194625).\n- crypto: arm64/aes-ce-cipher - move assembler code to .S file (git-fixes)\n- drm: add a locked version of drm_is_current_master (bsc#1197914).\n- drm: drm_file struct kABI compatibility workaround (bsc#1197914).\n- drm: protect drm_master pointers in drm_lease.c (bsc#1197914).\n- drm: serialize drm_file.master with a new spinlock (bsc#1197914).\n- drm: use the lookup lock in drm_is_current_master (bsc#1197914).\n- fbmem: do not allow too huge resolutions (bsc#1129770)\n- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).\n- fsl/fman: Check for null pointer after calling devm_ioremap (git-fixes).\n- hwrng: atmel - disable trng on failure path (git-fixes).\n- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).\n- i40e: Fix incorrect netdev\u0027s real number of RX/TX queues (git-fixes).\n- i40e: add correct exception tracing for XDP (git-fixes).\n- i40e: optimize for XDP_REDIRECT in xsk path (git-fixes).\n- ieee802154: atusb: fix uninit value in atusb_set_extended_addr (git-fixes).\n- io-64-nonatomic: add io{read|write}64{_lo_hi|_hi_lo} macros (git-fixes).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).\n- mac80211: mesh: fix potentially unaligned access (git-fixes).\n- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).\n- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: fix memory leak in em28xx_init_dev (git-fixes).\n- media: lmedm04: Fix misuse of comma (git-fixes).\n- media: rc-loopback: return number of emitters rather than error (git-fixes).\n- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).\n- media: uvc: do not do DMA on stack (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).\n- mt7601u: fix rx buffer refcounting (git-fixes).\n- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- mxser: fix xmit_buf leak in activate when LSR == 0xff (git-fixes).\n- net/mlx5e: Reduce tc unsupported key print level (git-fixes).\n- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).\n- net: ethernet: mtk_eth_soc: fix return values and refactor MDIO ops (git-fixes).\n- net: rtlwifi: properly check for alloc_workqueue() failure (git-fixes).\n- net: stmicro: handle clk_prepare() failure during init (git-fixes).\n- net: emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).\n- parisc/sticon: fix reverse colors (bsc#1129770)\n- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).\n- ppp: ensure minimum packet size in ppp_write() (git-fixes).\n- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).\n- random: check for signal_pending() outside of need_resched() check (git-fixes).\n- random: fix data race on crng_node_pool (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).\n- scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825).\n- tcp: Fix potential use-after-free due to double kfree() (bsc#1197075).\n- tcp: fix race condition when creating child sockets from syncookies (bsc#1197075).\n- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).\n- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (bsc#1129770)\n- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (bsc#1129770)\n- video: fbdev: chipsfb: use memset_io() instead of memset() (bsc#1129770)\n- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (bsc#1129770)\n- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (bsc#1129770)\n- video: fbdev: sm712fb: Fix crash in smtcfb_read() (bsc#1129770)\n- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (bsc#1129770)\n- video: fbdev: udlfb: properly check endpoint type (bsc#1129770)\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- x86/pm: Save the MSR validity status at context setup (bsc#1114648).\n- x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1114648).\n- xen/blkfront: fix comment for need_copy (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xen: fix is_xen_pmu() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-1651,SUSE-SLE-SERVER-12-SP5-2022-1651",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1651-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:1651-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221651-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:1651-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html"
},
{
"category": "self",
"summary": "SUSE Bug 1028340",
"url": "https://bugzilla.suse.com/1028340"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1084513",
"url": "https://bugzilla.suse.com/1084513"
},
{
"category": "self",
"summary": "SUSE Bug 1114648",
"url": "https://bugzilla.suse.com/1114648"
},
{
"category": "self",
"summary": "SUSE Bug 1121726",
"url": "https://bugzilla.suse.com/1121726"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1137728",
"url": "https://bugzilla.suse.com/1137728"
},
{
"category": "self",
"summary": "SUSE Bug 1172456",
"url": "https://bugzilla.suse.com/1172456"
},
{
"category": "self",
"summary": "SUSE Bug 1183723",
"url": "https://bugzilla.suse.com/1183723"
},
{
"category": "self",
"summary": "SUSE Bug 1187055",
"url": "https://bugzilla.suse.com/1187055"
},
{
"category": "self",
"summary": "SUSE Bug 1191647",
"url": "https://bugzilla.suse.com/1191647"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1194625",
"url": "https://bugzilla.suse.com/1194625"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1196247",
"url": "https://bugzilla.suse.com/1196247"
},
{
"category": "self",
"summary": "SUSE Bug 1196657",
"url": "https://bugzilla.suse.com/1196657"
},
{
"category": "self",
"summary": "SUSE Bug 1196901",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "self",
"summary": "SUSE Bug 1197075",
"url": "https://bugzilla.suse.com/1197075"
},
{
"category": "self",
"summary": "SUSE Bug 1197343",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "self",
"summary": "SUSE Bug 1197663",
"url": "https://bugzilla.suse.com/1197663"
},
{
"category": "self",
"summary": "SUSE Bug 1197888",
"url": "https://bugzilla.suse.com/1197888"
},
{
"category": "self",
"summary": "SUSE Bug 1197914",
"url": "https://bugzilla.suse.com/1197914"
},
{
"category": "self",
"summary": "SUSE Bug 1198217",
"url": "https://bugzilla.suse.com/1198217"
},
{
"category": "self",
"summary": "SUSE Bug 1198228",
"url": "https://bugzilla.suse.com/1198228"
},
{
"category": "self",
"summary": "SUSE Bug 1198400",
"url": "https://bugzilla.suse.com/1198400"
},
{
"category": "self",
"summary": "SUSE Bug 1198413",
"url": "https://bugzilla.suse.com/1198413"
},
{
"category": "self",
"summary": "SUSE Bug 1198516",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "self",
"summary": "SUSE Bug 1198660",
"url": "https://bugzilla.suse.com/1198660"
},
{
"category": "self",
"summary": "SUSE Bug 1198687",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "self",
"summary": "SUSE Bug 1198742",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "self",
"summary": "SUSE Bug 1198825",
"url": "https://bugzilla.suse.com/1198825"
},
{
"category": "self",
"summary": "SUSE Bug 1199012",
"url": "https://bugzilla.suse.com/1199012"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7755 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20292 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20321 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38208 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1011 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1280 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1353 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1419 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1516 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-23960 page",
"url": "https://www.suse.com/security/cve/CVE-2022-23960/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-05-12T15:14:31Z",
"generator": {
"date": "2022-05-12T15:14:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:1651-1",
"initial_release_date": "2022-05-12T15:14:31Z",
"revision_history": [
{
"date": "2022-05-12T15:14:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.97.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.97.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.97.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.97.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.97.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.97.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.97.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.97.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.97.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.97.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.97.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.97.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.97.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.97.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.97.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.97.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.97.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.97.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.97.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.97.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.97.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.97.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.97.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.97.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.97.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.97.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.97.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.97.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.97.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.97.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.97.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.97.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.97.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.97.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.97.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.97.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.97.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.97.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.97.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.97.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.97.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7755"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7755",
"url": "https://www.suse.com/security/cve/CVE-2018-7755"
},
{
"category": "external",
"summary": "SUSE Bug 1084513 for CVE-2018-7755",
"url": "https://bugzilla.suse.com/1084513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "low"
}
],
"title": "CVE-2018-7755"
},
{
"cve": "CVE-2019-20811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20811"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20811",
"url": "https://www.suse.com/security/cve/CVE-2019-20811"
},
{
"category": "external",
"summary": "SUSE Bug 1172456 for CVE-2019-20811",
"url": "https://bugzilla.suse.com/1172456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2019-20811"
},
{
"cve": "CVE-2021-20292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20292"
}
],
"notes": [
{
"category": "general",
"text": "There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20292",
"url": "https://www.suse.com/security/cve/CVE-2021-20292"
},
{
"category": "external",
"summary": "SUSE Bug 1183723 for CVE-2021-20292",
"url": "https://bugzilla.suse.com/1183723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2021-20292"
},
{
"cve": "CVE-2021-20321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20321"
}
],
"notes": [
{
"category": "general",
"text": "A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20321",
"url": "https://www.suse.com/security/cve/CVE-2021-20321"
},
{
"category": "external",
"summary": "SUSE Bug 1191647 for CVE-2021-20321",
"url": "https://bugzilla.suse.com/1191647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2021-20321"
},
{
"cve": "CVE-2021-38208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38208"
}
],
"notes": [
{
"category": "general",
"text": "net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38208",
"url": "https://www.suse.com/security/cve/CVE-2021-38208"
},
{
"category": "external",
"summary": "SUSE Bug 1187055 for CVE-2021-38208",
"url": "https://bugzilla.suse.com/1187055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2021-38208"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2022-1011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1011"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1011",
"url": "https://www.suse.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "SUSE Bug 1197343 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "external",
"summary": "SUSE Bug 1197344 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197344"
},
{
"category": "external",
"summary": "SUSE Bug 1198687 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212322 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1212322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-1280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1280"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1280",
"url": "https://www.suse.com/security/cve/CVE-2022-1280"
},
{
"category": "external",
"summary": "SUSE Bug 1197914 for CVE-2022-1280",
"url": "https://bugzilla.suse.com/1197914"
},
{
"category": "external",
"summary": "SUSE Bug 1198590 for CVE-2022-1280",
"url": "https://bugzilla.suse.com/1198590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-1280"
},
{
"cve": "CVE-2022-1353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1353"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1353",
"url": "https://www.suse.com/security/cve/CVE-2022-1353"
},
{
"category": "external",
"summary": "SUSE Bug 1198516 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "external",
"summary": "SUSE Bug 1212293 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1212293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1419"
}
],
"notes": [
{
"category": "general",
"text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1419",
"url": "https://www.suse.com/security/cve/CVE-2022-1419"
},
{
"category": "external",
"summary": "SUSE Bug 1198742 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "external",
"summary": "SUSE Bug 1201655 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1201655"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-1419"
},
{
"cve": "CVE-2022-1516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1516"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1516",
"url": "https://www.suse.com/security/cve/CVE-2022-1516"
},
{
"category": "external",
"summary": "SUSE Bug 1199012 for CVE-2022-1516",
"url": "https://bugzilla.suse.com/1199012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-23960",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-23960"
}
],
"notes": [
{
"category": "general",
"text": "Certain Arm Cortex and Neoverse processors through 2022-03-08 do not properly restrict cache speculation, aka Spectre-BHB. An attacker can leverage the shared branch history in the Branch History Buffer (BHB) to influence mispredicted branches. Then, cache allocation can allow the attacker to obtain sensitive information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-23960",
"url": "https://www.suse.com/security/cve/CVE-2022-23960"
},
{
"category": "external",
"summary": "SUSE Bug 1196657 for CVE-2022-23960",
"url": "https://bugzilla.suse.com/1196657"
},
{
"category": "external",
"summary": "SUSE Bug 1196901 for CVE-2022-23960",
"url": "https://bugzilla.suse.com/1196901"
},
{
"category": "external",
"summary": "SUSE Bug 1198228 for CVE-2022-23960",
"url": "https://bugzilla.suse.com/1198228"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "moderate"
}
],
"title": "CVE-2022-23960"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.97.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.97.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.97.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-12T15:14:31Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
}
]
}
suse-su-2022:1668-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 RT kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018).\n- CVE-2022-28356: Fixed a refcount leak bug found in net/llc/af_llc.c (bnc#1197391).\n- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).\n- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).\n- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516).\n- CVE-2022-1280: Fixed a use-after-free vulnerability in drm_lease_held in drivers/gpu/drm/drm_lease.c (bnc#1197914).\n- CVE-2022-1011: Fixed a use-after-free flaw inside the FUSE filesystem in the way a user triggers write(). This flaw allowed a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation (bnc#1197343).\n- CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).\n- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).\n- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).\n- CVE-2019-20811: Fixed issue in rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, where a reference count is mishandled (bnc#1172456).\n- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).\n\n\nThe following non-security bugs were fixed:\n\n- IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() (git-fixes)\n- NFSD: prevent underflow in nfssvc_decode_writeargs() (git-fixes).\n- NFSv4: Do not try to CLOSE if the stateid \u0027other\u0027 field has changed (bsc#1196247).\n- NFSv4: Fix a regression in nfs_set_open_stateid_locked() (bsc#1196247).\n- NFSv4: Handle NFS4ERR_OLD_STATEID in CLOSE/OPEN_DOWNGRADE (bsc#1196247).\n- NFSv4: Wait for stateid updates after CLOSE/OPEN_DOWNGRADE (bsc#1196247).\n- NFSv4: fix open failure with O_ACCMODE flag (git-fixes).\n- NFSv4: recover from pre-mature loss of openstateid (bsc#1196247).\n- PCI/switchtec: Read all 64 bits of part_event_bitmap (git-fixes).\n- PCI: Add device even if driver attach failed (git-fixes).\n- PCI: Do not enable AtomicOps on VFs (bsc#1129770)\n- PCI: Fix overflow in command-line resource alignment requests (git-fixes).\n- PCI: iproc: Fix out-of-bound array accesses (git-fixes).\n- PCI: iproc: Set affinity mask on MSI interrupts (git-fixes).\n- PCI: qcom: Change duplicate PCI reset to phy reset (git-fixes).\n- PCI: qcom: Make sure PCIe is reset before init for rev 2.1.0 (git-fixes).\n- RDMA/rxe: Missing unlock on error in get_srq_wqe() (git-fixes)\n- RDMA/rxe: Restore setting tot_len in the IPv4 header (git-fixes)\n- RDMA/rxe: Use the correct size of wqe when processing SRQ (git-fixes)\n- SUNRPC: Handle low memory situations in call_status() (git-fixes).\n- USB: Fix \u0027slab-out-of-bounds Write\u0027 bug in usb_hcd_poll_rh_status (git-fixes).\n- USB: core: Fix bug in resuming hub\u0027s handling of wakeup requests (git-fixes).\n- USB: serial: cp210x: add NCR Retail IO box id (git-fixes).\n- USB: serial: pl2303: add IBM device IDs (git-fixes).\n- USB: serial: simple: add Nokia phone driver (git-fixes).\n- USB: usb-storage: Fix use of bitfields for hardware data in ene_ub6250.c (git-fixes).\n- arm64/iommu: handle non-remapped addresses in -\u003emmap and (git-fixes)\n- arm64/mm: Inhibit huge-vmap with ptdump (git-fixes).\n- arm64: Clear OSDLR_EL1 on CPU boot (git-fixes)\n- arm64: Fix HCR.TGE status for NMI contexts (git-fixes)\n- arm64: Fix size of __early_cpu_boot_status (git-fixes)\n- arm64: Relax GIC version check during early boot (git-fixes)\n- arm64: Save and restore OSDLR_EL1 across suspend/resume (git-fixes)\n- arm64: cmpxchg: Use \u0027K\u0027 instead of \u0027L\u0027 for ll/sc immediate constraint (git-fixes)\n- arm64: compat: Allow single-byte watchpoints on all addresses (git-fixes)\n- arm64: compat: Provide definition for COMPAT_SIGMINSTKSZ (git-fixes)\n- arm64: compat: Reduce address limit (git-fixes)\n- arm64: cpufeature: Fix feature comparison for CTR_EL0.{CWG,ERG} (git-fixes)\n- arm64: debug: Don\u0027t propagate UNKNOWN FAR into si_code for debug (git-fixes)\n- arm64: debug: Ensure debug handlers check triggering exception level (git-fixes)\n- arm64: drop linker script hack to hide __efistub_ symbols (git-fixes)\n- arm64: dts: marvell: Fix A37xx UART0 register size (git-fixes)\n- arm64: entry: SP Alignment Fault doesn\u0027t write to FAR_EL1 (git-fixes)\n- arm64: fix for bad_mode() handler to always result in panic (git-fixes)\n- arm64: futex: Avoid copying out uninitialised stack in failed (git-fixes)\n- arm64: futex: Bound number of LDXR/STXR loops in FUTEX_WAKE_OP (git-fixes)\n- arm64: futex: Fix FUTEX_WAKE_OP atomic ops with non-zero result value (git-fixes)\n- arm64: hibernate: Clean the __hyp_text to PoC after resume (git-fixes)\n- arm64: hyp-stub: Forbid kprobing of the hyp-stub (git-fixes)\n- arm64: kaslr: ensure randomized quantities are clean also when kaslr (git-fixes)\n- arm64: kaslr: ensure randomized quantities are clean to the PoC (git-fixes)\n- arm64: kprobe: Always blacklist the KVM world-switch code (git-fixes)\n- arm64: kprobes: Recover pstate.D in single-step exception handler (git-fixes)\n- arm64: only advance singlestep for user instruction traps (git-fixes)\n- arm64: relocatable: fix inconsistencies in linker script and options (git-fixes)\n- arm: 9110/1: oabi-compat: fix oabi epoll sparse warning (bsc#1129770)\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- backlight: pwm_bl: Improve bootloader/kernel device handover (bsc#1129770)\n- bnx2x: fix napi API usage sequence (bsc#1198217).\n- bonding: pair enable_port with slave_arr_updates (git-fixes).\n- can: gs_usb: fix use of uninitialized variable, detach device on reception of invalid USB data (git-fixes).\n- char/mwave: Adjust io port register size (git-fixes).\n- cifs: do not skip link targets when an I/O fails (bsc#1194625).\n- crypto: arm64/aes-ce-cipher - move assembler code to .S file (git-fixes)\n- crypto: arm64/aes-neonbs - don\u0027t access already-freed walk.iv (git-fixes)\n- drivers: net: xgene: Fix regression in CRC stripping\n- drm/fb-helper: Mark screen buffers in system memory with (bsc#1129770)\n- fbmem: do not allow too huge resolutions (bsc#1129770)\n- fix parallelism for rpc tasks (bsc#1197663).\n- fs/nfs: Use fatal_signal_pending instead of signal_pending (git-fixes).\n- fsl/fman: Check for null pointer after calling devm_ioremap (git-fixes).\n- hwrng: atmel - disable trng on failure path (git-fixes).\n- hwrng: cavium - HW_RANDOM_CAVIUM should depend on ARCH_THUNDER (git-fixes).\n- i40e: Fix incorrect netdev\u0027s real number of RX/TX queues (git-fixes).\n- i40e: add correct exception tracing for XDP (git-fixes).\n- i40e: optimize for XDP_REDIRECT in xsk path (git-fixes).\n- ieee802154: atusb: fix uninit value in atusb_set_extended_addr (git-fixes).\n- io-64-nonatomic: add io{read|write}64{_lo_hi|_hi_lo} macros (git-fixes).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- livepatch: Do not block removal of patches that are safe to unload (bsc#1071995).\n- lpfc: Revert driver update to 14.2.0.1 (bsc#1198989)\n- mac80211: mesh: fix potentially unaligned access (git-fixes).\n- media: dvb-usb: fix uninit-value in dvb_usb_adapter_dvb_init (git-fixes).\n- media: dvb-usb: fix uninit-value in vp702x_read_mac_addr (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: fix memory leak in em28xx_init_dev (git-fixes).\n- media: lmedm04: Fix misuse of comma (git-fixes).\n- media: rc-loopback: return number of emitters rather than error (git-fixes).\n- media: stkwebcam: fix memory leak in stk_camera_probe (git-fixes).\n- media: uvc: do not do DMA on stack (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- media: videobuf2-core: dequeue if start_streaming fails (git-fixes).\n- mt7601u: fix rx buffer refcounting (git-fixes).\n- mwifiex: Read a PCI register after writing the TX ring write pointer (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- mxser: fix xmit_buf leak in activate when LSR == 0xff (git-fixes).\n- net/mlx5e: Reduce tc unsupported key print level (git-fixes).\n- net: bcmgenet: Don\u0027t claim WOL when its not available\n- net: davinci_emac: Fix incorrect masking of tx and rx error channel (git-fixes).\n- net: ethernet: mtk_eth_soc: fix return values and refactor MDIO ops (git-fixes).\n- net: mana: Add counter for XDP_TX (bsc#1195651).\n- net: mana: Add counter for packet dropped by XDP (bsc#1195651).\n- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).\n- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).\n- net: mana: Reuse XDP dropped page (bsc#1195651).\n- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).\n- net: qlogic: check the return value of dma_alloc_coherent()\n- net: rtlwifi: properly check for alloc_workqueue() failure (git-fixes).\n- net: stmicro: handle clk_prepare() failure during init (git-fixes).\n- net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send (git-fixes).\n- parisc/sticon: fix reverse colors (bsc#1129770)\n- powerpc/perf: Fix power9 event alternatives (bsc#1137728, LTC#178106, git-fixes).\n- ppp: ensure minimum packet size in ppp_write() (git-fixes).\n- ptrace: Check PTRACE_O_SUSPEND_SECCOMP permission on PTRACE_SEIZE (bsc#1198413).\n- qed: display VF trust config (git-fixes).\n- qed: return status of qed_iov_get_link (git-fixes).\n- qed: validate and restrict untrusted VFs vlan promisc mode\n- random: check for signal_pending() outside of need_resched() check (git-fixes).\n- random: fix data race on crng_node_pool (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- scsi: libsas: Fix sas_ata_qc_issue() handling of NCQ NON DATA commands (git-fixes).\n- scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825).\n- tcp: Fix potential use-after-free due to double kfree() (bsc#1197075).\n- tcp: fix race condition when creating child sockets from syncookies (bsc#1197075).\n- usb: hub: Fix usb enumeration issue due to address0 race (git-fixes).\n- usb: typec: tcpm: Wait in SNK_DEBOUNCED until disconnect (git-fixes).\n- usb: ulpi: Call of_node_put correctly (git-fixes).\n- usb: ulpi: Move of_node_put to ulpi_dev_release (git-fixes).\n- veth: Ensure eth header is in skb\u0027s linear part (git-fixes).\n- video: backlight: Drop maximum brightness override for brightness (bsc#1129770)\n- video: fbdev: atari: Atari 2 bpp (STe) palette bugfix (bsc#1129770)\n- video: fbdev: atmel_lcdfb: fix an error code in atmel_lcdfb_probe() (bsc#1129770)\n- video: fbdev: chipsfb: use memset_io() instead of memset() (bsc#1129770)\n- video: fbdev: fbcvt.c: fix printing in fb_cvt_print_name() (bsc#1129770)\n- video: fbdev: omapfb: Add missing of_node_put() in dvic_probe_of (bsc#1129770)\n- video: fbdev: sm712fb: Fix crash in smtcfb_read() (bsc#1129770)\n- video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() (bsc#1129770)\n- video: fbdev: udlfb: properly check endpoint type (bsc#1129770)\n- video: hyperv_fb: Fix validation of screen resolution (bsc#1129770)\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- x86/pm: Save the MSR validity status at context setup (bsc#1114648).\n- x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO (git-fixes).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1114648).\n- xen/blkfront: fix comment for need_copy (git-fixes).\n- xen: detect uninitialized xenbus in xenbus_init (git-fixes).\n- xen: do not continue xenstore initialization in case of errors (git-fixes).\n- xen: fix is_xen_pmu() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-1668,SUSE-SLE-RT-12-SP5-2022-1668",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_1668-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:1668-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20221668-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:1668-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html"
},
{
"category": "self",
"summary": "SUSE Bug 1028340",
"url": "https://bugzilla.suse.com/1028340"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1084513",
"url": "https://bugzilla.suse.com/1084513"
},
{
"category": "self",
"summary": "SUSE Bug 1114648",
"url": "https://bugzilla.suse.com/1114648"
},
{
"category": "self",
"summary": "SUSE Bug 1121726",
"url": "https://bugzilla.suse.com/1121726"
},
{
"category": "self",
"summary": "SUSE Bug 1129770",
"url": "https://bugzilla.suse.com/1129770"
},
{
"category": "self",
"summary": "SUSE Bug 1137728",
"url": "https://bugzilla.suse.com/1137728"
},
{
"category": "self",
"summary": "SUSE Bug 1172456",
"url": "https://bugzilla.suse.com/1172456"
},
{
"category": "self",
"summary": "SUSE Bug 1183723",
"url": "https://bugzilla.suse.com/1183723"
},
{
"category": "self",
"summary": "SUSE Bug 1187055",
"url": "https://bugzilla.suse.com/1187055"
},
{
"category": "self",
"summary": "SUSE Bug 1191647",
"url": "https://bugzilla.suse.com/1191647"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1194625",
"url": "https://bugzilla.suse.com/1194625"
},
{
"category": "self",
"summary": "SUSE Bug 1195651",
"url": "https://bugzilla.suse.com/1195651"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1196247",
"url": "https://bugzilla.suse.com/1196247"
},
{
"category": "self",
"summary": "SUSE Bug 1197075",
"url": "https://bugzilla.suse.com/1197075"
},
{
"category": "self",
"summary": "SUSE Bug 1197343",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "self",
"summary": "SUSE Bug 1197391",
"url": "https://bugzilla.suse.com/1197391"
},
{
"category": "self",
"summary": "SUSE Bug 1197663",
"url": "https://bugzilla.suse.com/1197663"
},
{
"category": "self",
"summary": "SUSE Bug 1197888",
"url": "https://bugzilla.suse.com/1197888"
},
{
"category": "self",
"summary": "SUSE Bug 1197914",
"url": "https://bugzilla.suse.com/1197914"
},
{
"category": "self",
"summary": "SUSE Bug 1198217",
"url": "https://bugzilla.suse.com/1198217"
},
{
"category": "self",
"summary": "SUSE Bug 1198413",
"url": "https://bugzilla.suse.com/1198413"
},
{
"category": "self",
"summary": "SUSE Bug 1198516",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "self",
"summary": "SUSE Bug 1198687",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "self",
"summary": "SUSE Bug 1198742",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "self",
"summary": "SUSE Bug 1198825",
"url": "https://bugzilla.suse.com/1198825"
},
{
"category": "self",
"summary": "SUSE Bug 1198989",
"url": "https://bugzilla.suse.com/1198989"
},
{
"category": "self",
"summary": "SUSE Bug 1199012",
"url": "https://bugzilla.suse.com/1199012"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7755 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20292 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20321 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38208 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1011 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1280 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1280/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1353 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1419 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1516 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28356 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-05-16T08:03:37Z",
"generator": {
"date": "2022-05-16T08:03:37Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:1668-1",
"initial_release_date": "2022-05-16T08:03:37Z",
"revision_history": [
{
"date": "2022-05-16T08:03:37Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-4.12.14-10.89.1.noarch",
"product": {
"name": "kernel-devel-rt-4.12.14-10.89.1.noarch",
"product_id": "kernel-devel-rt-4.12.14-10.89.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-4.12.14-10.89.1.noarch",
"product": {
"name": "kernel-source-rt-4.12.14-10.89.1.noarch",
"product_id": "kernel-source-rt-4.12.14-10.89.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"product_id": "cluster-md-kmp-rt-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-4.12.14-10.89.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-4.12.14-10.89.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"product": {
"name": "dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"product_id": "dlm-kmp-rt-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-4.12.14-10.89.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-4.12.14-10.89.1.x86_64",
"product_id": "dlm-kmp-rt_debug-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"product_id": "gfs2-kmp-rt-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-4.12.14-10.89.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-4.12.14-10.89.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-rt-4.12.14-10.89.1.x86_64",
"product_id": "kernel-rt-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-base-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-rt-base-4.12.14-10.89.1.x86_64",
"product_id": "kernel-rt-base-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-rt-devel-4.12.14-10.89.1.x86_64",
"product_id": "kernel-rt-devel-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-rt-extra-4.12.14-10.89.1.x86_64",
"product_id": "kernel-rt-extra-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-kgraft-devel-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-rt-kgraft-devel-4.12.14-10.89.1.x86_64",
"product_id": "kernel-rt-kgraft-devel-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-rt_debug-4.12.14-10.89.1.x86_64",
"product_id": "kernel-rt_debug-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-base-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-rt_debug-base-4.12.14-10.89.1.x86_64",
"product_id": "kernel-rt_debug-base-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"product_id": "kernel-rt_debug-devel-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-4.12.14-10.89.1.x86_64",
"product_id": "kernel-rt_debug-extra-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-rt_debug-kgraft-devel-4.12.14-10.89.1.x86_64",
"product_id": "kernel-rt_debug-kgraft-devel-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-4.12.14-10.89.1.x86_64",
"product": {
"name": "kernel-syms-rt-4.12.14-10.89.1.x86_64",
"product_id": "kernel-syms-rt-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-4.12.14-10.89.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-4.12.14-10.89.1.x86_64",
"product_id": "kselftests-kmp-rt-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-4.12.14-10.89.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-4.12.14-10.89.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"product_id": "ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-4.12.14-10.89.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-4.12.14-10.89.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-4.12.14-10.89.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-linux-enterprise-rt:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-4.12.14-10.89.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64"
},
"product_reference": "cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-4.12.14-10.89.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64"
},
"product_reference": "dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-4.12.14-10.89.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64"
},
"product_reference": "gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-4.12.14-10.89.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch"
},
"product_reference": "kernel-devel-rt-4.12.14-10.89.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-4.12.14-10.89.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64"
},
"product_reference": "kernel-rt-4.12.14-10.89.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-base-4.12.14-10.89.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64"
},
"product_reference": "kernel-rt-base-4.12.14-10.89.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-4.12.14-10.89.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64"
},
"product_reference": "kernel-rt-devel-4.12.14-10.89.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-4.12.14-10.89.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64"
},
"product_reference": "kernel-rt_debug-4.12.14-10.89.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-4.12.14-10.89.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64"
},
"product_reference": "kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-4.12.14-10.89.1.noarch as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch"
},
"product_reference": "kernel-source-rt-4.12.14-10.89.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-4.12.14-10.89.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64"
},
"product_reference": "kernel-syms-rt-4.12.14-10.89.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-4.12.14-10.89.1.x86_64 as component of SUSE Linux Enterprise Real Time 12 SP5",
"product_id": "SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
},
"product_reference": "ocfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Real Time 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-7755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7755"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7755",
"url": "https://www.suse.com/security/cve/CVE-2018-7755"
},
{
"category": "external",
"summary": "SUSE Bug 1084513 for CVE-2018-7755",
"url": "https://bugzilla.suse.com/1084513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "low"
}
],
"title": "CVE-2018-7755"
},
{
"cve": "CVE-2019-20811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20811"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20811",
"url": "https://www.suse.com/security/cve/CVE-2019-20811"
},
{
"category": "external",
"summary": "SUSE Bug 1172456 for CVE-2019-20811",
"url": "https://bugzilla.suse.com/1172456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2019-20811"
},
{
"cve": "CVE-2021-20292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20292"
}
],
"notes": [
{
"category": "general",
"text": "There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20292",
"url": "https://www.suse.com/security/cve/CVE-2021-20292"
},
{
"category": "external",
"summary": "SUSE Bug 1183723 for CVE-2021-20292",
"url": "https://bugzilla.suse.com/1183723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2021-20292"
},
{
"cve": "CVE-2021-20321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20321"
}
],
"notes": [
{
"category": "general",
"text": "A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20321",
"url": "https://www.suse.com/security/cve/CVE-2021-20321"
},
{
"category": "external",
"summary": "SUSE Bug 1191647 for CVE-2021-20321",
"url": "https://bugzilla.suse.com/1191647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2021-20321"
},
{
"cve": "CVE-2021-38208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38208"
}
],
"notes": [
{
"category": "general",
"text": "net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38208",
"url": "https://www.suse.com/security/cve/CVE-2021-38208"
},
{
"category": "external",
"summary": "SUSE Bug 1187055 for CVE-2021-38208",
"url": "https://bugzilla.suse.com/1187055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2021-38208"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2022-1011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1011"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1011",
"url": "https://www.suse.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "SUSE Bug 1197343 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "external",
"summary": "SUSE Bug 1197344 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197344"
},
{
"category": "external",
"summary": "SUSE Bug 1198687 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212322 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1212322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-1280",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1280"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in drm_lease_held in drivers/gpu/drm/drm_lease.c in the Linux kernel due to a race problem. This flaw allows a local user privilege attacker to cause a denial of service (DoS) or a kernel information leak.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1280",
"url": "https://www.suse.com/security/cve/CVE-2022-1280"
},
{
"category": "external",
"summary": "SUSE Bug 1197914 for CVE-2022-1280",
"url": "https://bugzilla.suse.com/1197914"
},
{
"category": "external",
"summary": "SUSE Bug 1198590 for CVE-2022-1280",
"url": "https://bugzilla.suse.com/1198590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-1280"
},
{
"cve": "CVE-2022-1353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1353"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1353",
"url": "https://www.suse.com/security/cve/CVE-2022-1353"
},
{
"category": "external",
"summary": "SUSE Bug 1198516 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "external",
"summary": "SUSE Bug 1212293 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1212293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1419"
}
],
"notes": [
{
"category": "general",
"text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1419",
"url": "https://www.suse.com/security/cve/CVE-2022-1419"
},
{
"category": "external",
"summary": "SUSE Bug 1198742 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "external",
"summary": "SUSE Bug 1201655 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1201655"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-1419"
},
{
"cve": "CVE-2022-1516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1516"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1516",
"url": "https://www.suse.com/security/cve/CVE-2022-1516"
},
{
"category": "external",
"summary": "SUSE Bug 1199012 for CVE-2022-1516",
"url": "https://bugzilla.suse.com/1199012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-28356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28356"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel before 5.17.1, a refcount leak bug was found in net/llc/af_llc.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28356",
"url": "https://www.suse.com/security/cve/CVE-2022-28356"
},
{
"category": "external",
"summary": "SUSE Bug 1197391 for CVE-2022-28356",
"url": "https://bugzilla.suse.com/1197391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "moderate"
}
],
"title": "CVE-2022-28356"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Real Time 12 SP5:cluster-md-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:dlm-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:gfs2-kmp-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-devel-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-base-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-rt_debug-devel-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-source-rt-4.12.14-10.89.1.noarch",
"SUSE Linux Enterprise Real Time 12 SP5:kernel-syms-rt-4.12.14-10.89.1.x86_64",
"SUSE Linux Enterprise Real Time 12 SP5:ocfs2-kmp-rt-4.12.14-10.89.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-05-16T08:03:37Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
}
]
}
suse-su-2024:2561-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2020-10135: Legacy pairing and secure-connections pairing authentication Bluetooth might have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access (bsc#1171988).\n- CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).\n- CVE-2021-47145: btrfs: do not BUG_ON in link_to_fixup_dir (bsc#1222005).\n- CVE-2021-47191: Fix out-of-bound read in resp_readcap16() (bsc#1222866).\n- CVE-2021-47201: iavf: free q_vectors before queues in iavf_disable_vf (bsc#1222792).\n- CVE-2021-47267: usb: fix various gadget panics on 10gbps cabling (bsc#1224993).\n- CVE-2021-47270: usb: fix various gadgets null ptr deref on 10gbps cabling (bsc#1224997).\n- CVE-2021-47275: bcache: avoid oversized read request in cache missing code path (bsc#1224965).\n- CVE-2021-47293: net/sched: act_skbmod: Skip non-Ethernet packets (bsc#1224978).\n- CVE-2021-47294: netrom: Decrease sock refcount when sock timers expire (bsc#1224977).\n- CVE-2021-47297: net: fix uninit-value in caif_seqpkt_sendmsg (bsc#1224976).\n- CVE-2021-47309: net: validate lwtstate-\u003edata before returning from skb_tunnel_info() (bsc#1224967).\n- CVE-2021-47328: blacklist.conf: bsc#1225047 CVE-2021-47328: breaks kABI Also, does not apply.\n- CVE-2021-47354: drm/sched: Avoid data corruptions (bsc#1225140)\n- CVE-2021-47372: net: macb: fix use after free on rmmod (bsc#1225184).\n- CVE-2021-47379: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd (bsc#1225203).\n- CVE-2021-47407: KVM: x86: Handle SRCU initialization failure during page track init (bsc#1225306).\n- CVE-2021-47418: net_sched: fix NULL deref in fifo_set_limit() (bsc#1225337).\n- CVE-2021-47434: xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1225232).\n- CVE-2021-47438: net/mlx5e: nullify cq-\u003edbg pointer in mlx5_debug_cq_remove() (bsc#1225229)\n- CVE-2021-47445: drm/msm: Fix null pointer dereference on pointer edp (bsc#1225261)\n- CVE-2021-47498: dm rq: do not queue request to blk-mq during DM suspend (bsc#1225357).\n- CVE-2021-47518: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done (bsc#1225372).\n- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).\n- CVE-2021-47544: tcp: fix page frag corruption on page fault (bsc#1225463).\n- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array \u0027lp-\u003ephy\u0027 may be out of bound (bsc#1225505).\n- CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514).\n- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).\n- CVE-2021-47587: net: systemport: Add global locking for descriptor lifecycle (bsc#1226567).\n- CVE-2021-47602: mac80211: track only QoS data frames for admission control (bsc#1226554).\n- CVE-2021-47609: firmware: arm_scpi: Fix string overflow in SCPI genpd driver (bsc#1226562)\n- CVE-2022-48732: drm/nouveau: fix off by one in BIOS boundary checking (bsc#1226716)\n- CVE-2022-48733: btrfs: fix use-after-free after failure to create a snapshot (bsc#1226718).\n- CVE-2022-48740: selinux: fix double free of cond_list on error paths (bsc#1226699).\n- CVE-2022-48743: net: amd-xgbe: Fix skb data length underflow (bsc#1226705).\n- CVE-2022-48756: drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (bsc#1226698)\n- CVE-2022-48759: rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (bsc#1226711).\n- CVE-2022-48761: usb: xhci-plat: fix crash when suspend if remote wake enable (bsc#1226701).\n- CVE-2022-48772: media: lgdt3306a: Add a check against null-pointer-def (bsc#1226976).\n- CVE-2023-24023: Bluetooth: Add more enc key size check (bsc#1218148).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).\n- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).\n- CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504).\n- CVE-2023-52683: ACPI: LPIT: Avoid u32 multiplication overflow (bsc#1224627).\n- CVE-2023-52693: ACPI: video: check for error while searching for backlight device parent (bsc#1224686).\n- CVE-2023-52737: btrfs: lock the inode in shared mode before starting fiemap (bsc#1225484).\n- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).\n- CVE-2023-52753: drm/amd/display: Avoid NULL dereference of timing generator (bsc#1225478).\n- CVE-2023-52754: media: imon: fix access to invalid resource for the second interface (bsc#1225490).\n- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).\n- CVE-2023-52762: virtio-blk: fix implicit overflow on virtio_max_dma_size (bsc#1225573).\n- CVE-2023-52764: media: gspca: cpia1: shift-out-of-bounds in set_flicker (bsc#1225571).\n- CVE-2023-52784: bonding: stop the device in bond_setup_by_slave() (bsc#1224946).\n- CVE-2023-52817: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (bsc#1225569).\n- CVE-2023-52818: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (bsc#1225530).\n- CVE-2023-52819: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (bsc#1225532).\n- CVE-2023-52832: wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (bsc#1225577).\n- CVE-2023-52834: atl1c: Work around the DMA RX overflow issue (bsc#1225599).\n- CVE-2023-52835: perf/core: Bail out early if the request AUX area is out of bound (bsc#1225602).\n- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).\n- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).\n- CVE-2023-52855: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (bsc#1225583).\n- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).\n- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).\n- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).\n- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).\n- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).\n- CVE-2024-26679: Fixed read sk-\u003esk_family once in inet_recv_error() (bsc#1222385).\n- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).\n- CVE-2024-26720: mm: Avoid overflows in dirty throttling logic (bsc#1222364).\n- CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).\n- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).\n- CVE-2024-26880: dm: call the resume method on internal suspend (bsc#1223188).\n- CVE-2024-26894: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() (bsc#1223043).\n- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).\n- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).\n- CVE-2024-26973: fat: fix uninitialized field in nostale filehandles (bsc#1223641).\n- CVE-2024-27399: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (bsc#1224177).\n- CVE-2024-27410: Reject iftype change with mesh ID change (bsc#1224432).\n- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).\n- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).\n- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).\n- CVE-2024-35819: soc: fsl: qbman: Use raw spinlock for cgr_lock (bsc#1224683).\n- CVE-2024-35822: usb: udc: remove warning when queue disabled ep (bsc#1224739).\n- CVE-2024-35828: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (bsc#1224622).\n- CVE-2024-35835: net/mlx5e: fix a double-free in arfs_create_groups (bsc#1224605).\n- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).\n- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).\n- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).\n- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668).\n- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).\n- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).\n- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).\n- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).\n- CVE-2024-35922: fbmon: prevent division by zero in fb_videomode_from_videomode() (bsc#1224660)\n- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).\n- CVE-2024-35930: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() (bsc#1224651).\n- CVE-2024-35947: dyndbg: fix old BUG_ON in \u003econtrol parser (bsc#1224647).\n- CVE-2024-35950: drm/client: Fully protect modes with dev-\u003emode_config.mutex (bsc#1224703).\n- CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations (bsc#1224674)\n- CVE-2024-35958: net: ena: Fix incorrect descriptor free behavior (bsc#1224677).\n- CVE-2024-35960: net/mlx5: Properly link new fs rules into the tree (bsc#1224588).\n- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).\n- CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572).\n- CVE-2024-35997: Remove I2C_HID_READ_PENDING flag to prevent lock-up (bsc#1224552).\n- CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).\n- CVE-2024-36014: drm/arm/malidp: fix a possible null pointer dereference (bsc#1225593).\n- CVE-2024-36016: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (bsc#1225642).\n- CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).\n- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).\n- CVE-2024-36952: scsi: lpfc: Move NPIV\u0027s transport unregistration to after resource clean up (bsc#1225898).\n- CVE-2024-36880: Bluetooth: qca: add missing firmware sanity checks (bsc#1225722).\n- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).\n- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).\n- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).\n- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).\n- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).\n- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).\n- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).\n- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).\n- CVE-2024-36941: wifi: nl80211: do not free NULL coalescing rule (bsc#1225835).\n- CVE-2024-36949: amd/amdkfd: sync all devices to wait all processes being evicted (bsc#1225872)\n- CVE-2024-36950: firewire: ohci: mask bus reset interrupts between ISR and bottom half (bsc#1225895).\n- CVE-2024-36960: drm/vmwgfx: Fix invalid reads in fence signaled events (bsc#1225872)\n- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).\n- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).\n- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).\n- CVE-2024-38544: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (bsc#1226597)\n- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).\n- CVE-2024-38546: drm: vc4: Fix possible null pointer dereference (bsc#1226593).\n- CVE-2024-38549: drm/mediatek: Add 0 size check to mtk_drm_gem_obj (bsc#1226735)\n- CVE-2024-38552: drm/amd/display: Fix potential index out of bounds in color (bsc#1226767)\n- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).\n- CVE-2024-38565: wifi: ar5523: enable proper endpoint verification (bsc#1226747).\n- CVE-2024-38567: wifi: carl9170: add a proper sanity check for endpoints (bsc#1226769).\n- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634).\n- CVE-2024-38579: crypto: bcm - Fix pointer arithmetic (bsc#1226637).\n- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).\n- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).\n- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).\n- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).\n- CVE-2024-38618: ALSA: timer: Set lower bound of start tick time (bsc#1226754).\n- CVE-2024-38619: usb-storage: alauda: Check whether the media is initialized (bsc#1226861).\n- CVE-2024-38621: media: stk1160: fix bounds checking in stk1160_copy_video() (bsc#1226895).\n- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).\n- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).\n- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).\n- CVE-2024-38780: dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (bsc#1226886).\n- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).\n- CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)\n\nThe following non-security bugs were fixed:\n\n- Btrfs: bail out on error during replay_dir_deletes (git-fixes)\n- Btrfs: clean up resources during umount after trans is aborted (git-fixes)\n- Btrfs: fix NULL pointer dereference in log_dir_items (git-fixes)\n- Btrfs: fix memory and mount leak in btrfs_ioctl_rm_dev_v2() (git-fixes)\n- Btrfs: fix unexpected EEXIST from btrfs_get_extent (git-fixes)\n- Btrfs: send, fix issuing write op when processing hole in no data mode (git-fixes)\n- KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond (git-fixes).\n- NFSv4: Always clear the pNFS layout when handling ESTALE (bsc#1221791).\n- NFSv4: nfs_set_open_stateid must not trigger state recovery for closed state (bsc#1221791).\n- PM: hibernate: x86: Use crc32 instead of md5 for hibernation e820 integrity check (git-fixes).\n- PNFS for stateid errors retry against MDS first (bsc#1221791).\n- RDMA/mlx5: Add check for srq max_sge attribute (git-fixes)\n- Revert \u0027build initrd without systemd\u0027 (bsc#1195775)\u0027\n- SUNRPC: Fix gss_free_in_token_pages() (git-fixes).\n- SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).\n- USB: serial: option: add Foxconn T99W265 with new baseline (git-fixes).\n- USB: serial: option: add Quectel EG912Y module support (git-fixes).\n- USB: serial: option: add Quectel RM500Q R13 firmware support (git-fixes).\n- arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes).\n- blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init (bsc#1216062 bsc#1225203).\n- blk-cgroup: fix missing pd_online_fn() while activating policy (git-fixes bsc#1225203).\n- blk-cgroup: support to track if policy is online (bsc#1216062 bsc#1225203).\n- bpf, scripts: Correct GPL license name (git-fixes).\n- bsc#1225894: Fix build warning Fix the following build warning. * unused-variable (i) in ../drivers/gpu/drm/amd/amdkfd/kfd_device.c in kgd2kfd_resume ../drivers/gpu/drm/amd/amdkfd/kfd_device.c: In function \u0027kgd2kfd_resume\u0027: ../drivers/gpu/drm/amd/amdkfd/kfd_device.c:621:11: warning: unused variable \u0027i\u0027 [-Wunused-variable]\n- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (git-fixes)\n- btrfs: fix crash when trying to resume balance without the resume flag (git-fixes)\n- btrfs: fix describe_relocation when printing unknown flags (git-fixes)\n- btrfs: fix false EIO for missing device (git-fixes)\n- btrfs: tree-check: reduce stack consumption in check_dir_item (git-fixes)\n- btrfs: use correct compare function of dirty_metadata_bytes (git-fixes)\n- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).\n- drm/amdkfd: Rework kfd_locked handling (bsc#1225872)\n- fix compat handling of FICLONERANGE, FIDEDUPERANGE and FS_IOC_FIEMAP (bsc#1225848).\n- fs: make fiemap work from compat_ioctl (bsc#1225848).\n- iommu/amd: Fix sysfs leak in iommu init (git-fixes).\n- iommu/vt-d: Allocate local memory for page request queue (git-fixes).\n- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)\n- kabi: blkcg_policy_data fix KABI (bsc#1216062 bsc#1225203).\n- kgdb: Add kgdb_has_hit_break function (git-fixes).\n- kgdb: Move the extern declaration kgdb_has_hit_break() to generic kgdb.h (git-fixes).\n- mkspec-dtb: add toplevel symlinks also on arm\n- net: hsr: fix placement of logical operator in a multi-line statement (bsc#1223021).\n- net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes).\n- net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-fixes).\n- nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes).\n- nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).\n- nvmet: fix ns enable/disable possible hang (git-fixes).\n- ocfs2: adjust enabling place for la window (bsc#1219224).\n- ocfs2: fix sparse warnings (bsc#1219224).\n- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).\n- ocfs2: speed up chain-list searching (bsc#1219224).\n- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).\n- rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212) Some builds do not just create an iso9660 image, but also mount it during build.\n- rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211) docker needs more networking modules, even legacy iptable_nat and _filter.\n- rpm/kernel-obs-build.spec.in: Include algif_hash, aegis128 and xts modules afgif_hash is needed by some packages (e.g. iwd) for tests, xts is used for LUKS2 volumes by default and aegis128 is useful as AEAD cipher for LUKS2. Wrap the long line to make it readable.\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (bsc#1227407).\n- scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes).\n- scsi: 53c700: Check that command slot is not NULL (git-fixes).\n- scsi: be2iscsi: Add length check when parsing nlattrs (git-fixes).\n- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).\n- scsi: bfa: Fix function pointer type mismatch for hcb_qe-\u003ecbfn (git-fixes).\n- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).\n- scsi: core: Decrease scsi_device\u0027s iorequest_cnt if dispatch failed (git-fixes).\n- scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes).\n- scsi: core: Fix possible memory leak if device_add() fails (git-fixes).\n- scsi: csiostor: Avoid function pointer casts (git-fixes).\n- scsi: isci: Fix an error code problem in isci_io_request_build() (git-fixes).\n- scsi: iscsi: Add length check for nlattr payload (git-fixes).\n- scsi: iscsi: Add strlen() check in iscsi_if_set{_host}_param() (git-fixes).\n- scsi: iscsi_tcp: restrict to TCP sockets (git-fixes).\n- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).\n- scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes).\n- scsi: libsas: Fix disk not being scanned in after being removed (git-fixes).\n- scsi: libsas: Introduce struct smp_disc_resp (git-fixes).\n- scsi: lpfc: Correct size for wqe for memset() (git-fixes).\n- scsi: lpfc: Fix double free in lpfc_cmpl_els_logo_acc() caused by lpfc_nlp_not_used() (git-fixes).\n- scsi: lpfc: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).\n- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).\n- scsi: mpt3sas: Fix in error path (git-fixes).\n- scsi: mpt3sas: Fix loop logic (git-fixes).\n- scsi: mpt3sas: Perform additional retries if doorbell read returns 0 (git-fixes).\n- scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly (git-fixes).\n- scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly (git-fixes).\n- scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly (git-fixes).\n- scsi: qedf: Fix NULL dereference in error handling (git-fixes).\n- scsi: qedf: Fix firmware halt over suspend and resume (git-fixes).\n- scsi: qedi: Fix firmware halt over suspend and resume (git-fixes).\n- scsi: qedi: Fix potential deadlock on \u0026qedi_percpu-\u003ep_work_lock (git-fixes).\n- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).\n- scsi: qla4xxx: Add length check when parsing nlattrs (git-fixes).\n- scsi: snic: Fix double free in snic_tgt_create() (git-fixes).\n- scsi: snic: Fix possible memory leak if device_add() fails (git-fixes).\n- scsi: stex: Fix gcc 13 warnings (git-fixes).\n- scsi: target: core: Add TMF to tmr_list handling (bsc#1223018 CVE-26845).\n- sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).\n- usb: port: Do not try to peer unused USB ports based on location (git-fixes).\n- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).\n- x86/apic: Fix kernel panic when booting with intremap=off and x2apic_phys (git-fixes).\n- x86/boot/e820: Fix typo in e820.c comment (git-fixes).\n- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).\n- x86/fpu: Return proper error codes from user access functions (git-fixes).\n- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).\n- x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).\n- x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).\n- x86/msr: Fix wr/rdmsr_safe_regs_on_cpu() prototypes (git-fixes).\n- x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).\n- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).\n- x86: __memcpy_flushcache: fix wrong alignment if size \u003e 2^32 (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2561,SUSE-SLE-HA-12-SP5-2024-2561,SUSE-SLE-Live-Patching-12-SP5-2024-2561,SUSE-SLE-SDK-12-SP5-2024-2561,SUSE-SLE-SERVER-12-SP5-2024-2561,SUSE-SLE-WE-12-SP5-2024-2561",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2561-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2561-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242561-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2561-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html"
},
{
"category": "self",
"summary": "SUSE Bug 1119113",
"url": "https://bugzilla.suse.com/1119113"
},
{
"category": "self",
"summary": "SUSE Bug 1171988",
"url": "https://bugzilla.suse.com/1171988"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1195065",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "self",
"summary": "SUSE Bug 1195254",
"url": "https://bugzilla.suse.com/1195254"
},
{
"category": "self",
"summary": "SUSE Bug 1195775",
"url": "https://bugzilla.suse.com/1195775"
},
{
"category": "self",
"summary": "SUSE Bug 1204514",
"url": "https://bugzilla.suse.com/1204514"
},
{
"category": "self",
"summary": "SUSE Bug 1215420",
"url": "https://bugzilla.suse.com/1215420"
},
{
"category": "self",
"summary": "SUSE Bug 1216062",
"url": "https://bugzilla.suse.com/1216062"
},
{
"category": "self",
"summary": "SUSE Bug 1217912",
"url": "https://bugzilla.suse.com/1217912"
},
{
"category": "self",
"summary": "SUSE Bug 1218148",
"url": "https://bugzilla.suse.com/1218148"
},
{
"category": "self",
"summary": "SUSE Bug 1219224",
"url": "https://bugzilla.suse.com/1219224"
},
{
"category": "self",
"summary": "SUSE Bug 1220833",
"url": "https://bugzilla.suse.com/1220833"
},
{
"category": "self",
"summary": "SUSE Bug 1221010",
"url": "https://bugzilla.suse.com/1221010"
},
{
"category": "self",
"summary": "SUSE Bug 1221647",
"url": "https://bugzilla.suse.com/1221647"
},
{
"category": "self",
"summary": "SUSE Bug 1221654",
"url": "https://bugzilla.suse.com/1221654"
},
{
"category": "self",
"summary": "SUSE Bug 1221656",
"url": "https://bugzilla.suse.com/1221656"
},
{
"category": "self",
"summary": "SUSE Bug 1221659",
"url": "https://bugzilla.suse.com/1221659"
},
{
"category": "self",
"summary": "SUSE Bug 1221791",
"url": "https://bugzilla.suse.com/1221791"
},
{
"category": "self",
"summary": "SUSE Bug 1221958",
"url": "https://bugzilla.suse.com/1221958"
},
{
"category": "self",
"summary": "SUSE Bug 1222005",
"url": "https://bugzilla.suse.com/1222005"
},
{
"category": "self",
"summary": "SUSE Bug 1222015",
"url": "https://bugzilla.suse.com/1222015"
},
{
"category": "self",
"summary": "SUSE Bug 1222080",
"url": "https://bugzilla.suse.com/1222080"
},
{
"category": "self",
"summary": "SUSE Bug 1222364",
"url": "https://bugzilla.suse.com/1222364"
},
{
"category": "self",
"summary": "SUSE Bug 1222385",
"url": "https://bugzilla.suse.com/1222385"
},
{
"category": "self",
"summary": "SUSE Bug 1222435",
"url": "https://bugzilla.suse.com/1222435"
},
{
"category": "self",
"summary": "SUSE Bug 1222792",
"url": "https://bugzilla.suse.com/1222792"
},
{
"category": "self",
"summary": "SUSE Bug 1222809",
"url": "https://bugzilla.suse.com/1222809"
},
{
"category": "self",
"summary": "SUSE Bug 1222866",
"url": "https://bugzilla.suse.com/1222866"
},
{
"category": "self",
"summary": "SUSE Bug 1222879",
"url": "https://bugzilla.suse.com/1222879"
},
{
"category": "self",
"summary": "SUSE Bug 1222893",
"url": "https://bugzilla.suse.com/1222893"
},
{
"category": "self",
"summary": "SUSE Bug 1223013",
"url": "https://bugzilla.suse.com/1223013"
},
{
"category": "self",
"summary": "SUSE Bug 1223018",
"url": "https://bugzilla.suse.com/1223018"
},
{
"category": "self",
"summary": "SUSE Bug 1223021",
"url": "https://bugzilla.suse.com/1223021"
},
{
"category": "self",
"summary": "SUSE Bug 1223043",
"url": "https://bugzilla.suse.com/1223043"
},
{
"category": "self",
"summary": "SUSE Bug 1223188",
"url": "https://bugzilla.suse.com/1223188"
},
{
"category": "self",
"summary": "SUSE Bug 1223384",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "self",
"summary": "SUSE Bug 1223532",
"url": "https://bugzilla.suse.com/1223532"
},
{
"category": "self",
"summary": "SUSE Bug 1223641",
"url": "https://bugzilla.suse.com/1223641"
},
{
"category": "self",
"summary": "SUSE Bug 1224177",
"url": "https://bugzilla.suse.com/1224177"
},
{
"category": "self",
"summary": "SUSE Bug 1224432",
"url": "https://bugzilla.suse.com/1224432"
},
{
"category": "self",
"summary": "SUSE Bug 1224504",
"url": "https://bugzilla.suse.com/1224504"
},
{
"category": "self",
"summary": "SUSE Bug 1224549",
"url": "https://bugzilla.suse.com/1224549"
},
{
"category": "self",
"summary": "SUSE Bug 1224552",
"url": "https://bugzilla.suse.com/1224552"
},
{
"category": "self",
"summary": "SUSE Bug 1224572",
"url": "https://bugzilla.suse.com/1224572"
},
{
"category": "self",
"summary": "SUSE Bug 1224575",
"url": "https://bugzilla.suse.com/1224575"
},
{
"category": "self",
"summary": "SUSE Bug 1224583",
"url": "https://bugzilla.suse.com/1224583"
},
{
"category": "self",
"summary": "SUSE Bug 1224588",
"url": "https://bugzilla.suse.com/1224588"
},
{
"category": "self",
"summary": "SUSE Bug 1224605",
"url": "https://bugzilla.suse.com/1224605"
},
{
"category": "self",
"summary": "SUSE Bug 1224622",
"url": "https://bugzilla.suse.com/1224622"
},
{
"category": "self",
"summary": "SUSE Bug 1224627",
"url": "https://bugzilla.suse.com/1224627"
},
{
"category": "self",
"summary": "SUSE Bug 1224647",
"url": "https://bugzilla.suse.com/1224647"
},
{
"category": "self",
"summary": "SUSE Bug 1224651",
"url": "https://bugzilla.suse.com/1224651"
},
{
"category": "self",
"summary": "SUSE Bug 1224660",
"url": "https://bugzilla.suse.com/1224660"
},
{
"category": "self",
"summary": "SUSE Bug 1224661",
"url": "https://bugzilla.suse.com/1224661"
},
{
"category": "self",
"summary": "SUSE Bug 1224662",
"url": "https://bugzilla.suse.com/1224662"
},
{
"category": "self",
"summary": "SUSE Bug 1224664",
"url": "https://bugzilla.suse.com/1224664"
},
{
"category": "self",
"summary": "SUSE Bug 1224668",
"url": "https://bugzilla.suse.com/1224668"
},
{
"category": "self",
"summary": "SUSE Bug 1224670",
"url": "https://bugzilla.suse.com/1224670"
},
{
"category": "self",
"summary": "SUSE Bug 1224672",
"url": "https://bugzilla.suse.com/1224672"
},
{
"category": "self",
"summary": "SUSE Bug 1224674",
"url": "https://bugzilla.suse.com/1224674"
},
{
"category": "self",
"summary": "SUSE Bug 1224677",
"url": "https://bugzilla.suse.com/1224677"
},
{
"category": "self",
"summary": "SUSE Bug 1224678",
"url": "https://bugzilla.suse.com/1224678"
},
{
"category": "self",
"summary": "SUSE Bug 1224683",
"url": "https://bugzilla.suse.com/1224683"
},
{
"category": "self",
"summary": "SUSE Bug 1224686",
"url": "https://bugzilla.suse.com/1224686"
},
{
"category": "self",
"summary": "SUSE Bug 1224703",
"url": "https://bugzilla.suse.com/1224703"
},
{
"category": "self",
"summary": "SUSE Bug 1224735",
"url": "https://bugzilla.suse.com/1224735"
},
{
"category": "self",
"summary": "SUSE Bug 1224739",
"url": "https://bugzilla.suse.com/1224739"
},
{
"category": "self",
"summary": "SUSE Bug 1224743",
"url": "https://bugzilla.suse.com/1224743"
},
{
"category": "self",
"summary": "SUSE Bug 1224763",
"url": "https://bugzilla.suse.com/1224763"
},
{
"category": "self",
"summary": "SUSE Bug 1224764",
"url": "https://bugzilla.suse.com/1224764"
},
{
"category": "self",
"summary": "SUSE Bug 1224765",
"url": "https://bugzilla.suse.com/1224765"
},
{
"category": "self",
"summary": "SUSE Bug 1224946",
"url": "https://bugzilla.suse.com/1224946"
},
{
"category": "self",
"summary": "SUSE Bug 1224951",
"url": "https://bugzilla.suse.com/1224951"
},
{
"category": "self",
"summary": "SUSE Bug 1224965",
"url": "https://bugzilla.suse.com/1224965"
},
{
"category": "self",
"summary": "SUSE Bug 1224967",
"url": "https://bugzilla.suse.com/1224967"
},
{
"category": "self",
"summary": "SUSE Bug 1224976",
"url": "https://bugzilla.suse.com/1224976"
},
{
"category": "self",
"summary": "SUSE Bug 1224977",
"url": "https://bugzilla.suse.com/1224977"
},
{
"category": "self",
"summary": "SUSE Bug 1224978",
"url": "https://bugzilla.suse.com/1224978"
},
{
"category": "self",
"summary": "SUSE Bug 1224993",
"url": "https://bugzilla.suse.com/1224993"
},
{
"category": "self",
"summary": "SUSE Bug 1224997",
"url": "https://bugzilla.suse.com/1224997"
},
{
"category": "self",
"summary": "SUSE Bug 1225047",
"url": "https://bugzilla.suse.com/1225047"
},
{
"category": "self",
"summary": "SUSE Bug 1225140",
"url": "https://bugzilla.suse.com/1225140"
},
{
"category": "self",
"summary": "SUSE Bug 1225184",
"url": "https://bugzilla.suse.com/1225184"
},
{
"category": "self",
"summary": "SUSE Bug 1225203",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "self",
"summary": "SUSE Bug 1225229",
"url": "https://bugzilla.suse.com/1225229"
},
{
"category": "self",
"summary": "SUSE Bug 1225232",
"url": "https://bugzilla.suse.com/1225232"
},
{
"category": "self",
"summary": "SUSE Bug 1225261",
"url": "https://bugzilla.suse.com/1225261"
},
{
"category": "self",
"summary": "SUSE Bug 1225306",
"url": "https://bugzilla.suse.com/1225306"
},
{
"category": "self",
"summary": "SUSE Bug 1225337",
"url": "https://bugzilla.suse.com/1225337"
},
{
"category": "self",
"summary": "SUSE Bug 1225357",
"url": "https://bugzilla.suse.com/1225357"
},
{
"category": "self",
"summary": "SUSE Bug 1225372",
"url": "https://bugzilla.suse.com/1225372"
},
{
"category": "self",
"summary": "SUSE Bug 1225431",
"url": "https://bugzilla.suse.com/1225431"
},
{
"category": "self",
"summary": "SUSE Bug 1225463",
"url": "https://bugzilla.suse.com/1225463"
},
{
"category": "self",
"summary": "SUSE Bug 1225478",
"url": "https://bugzilla.suse.com/1225478"
},
{
"category": "self",
"summary": "SUSE Bug 1225484",
"url": "https://bugzilla.suse.com/1225484"
},
{
"category": "self",
"summary": "SUSE Bug 1225487",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "self",
"summary": "SUSE Bug 1225490",
"url": "https://bugzilla.suse.com/1225490"
},
{
"category": "self",
"summary": "SUSE Bug 1225505",
"url": "https://bugzilla.suse.com/1225505"
},
{
"category": "self",
"summary": "SUSE Bug 1225514",
"url": "https://bugzilla.suse.com/1225514"
},
{
"category": "self",
"summary": "SUSE Bug 1225518",
"url": "https://bugzilla.suse.com/1225518"
},
{
"category": "self",
"summary": "SUSE Bug 1225530",
"url": "https://bugzilla.suse.com/1225530"
},
{
"category": "self",
"summary": "SUSE Bug 1225532",
"url": "https://bugzilla.suse.com/1225532"
},
{
"category": "self",
"summary": "SUSE Bug 1225548",
"url": "https://bugzilla.suse.com/1225548"
},
{
"category": "self",
"summary": "SUSE Bug 1225555",
"url": "https://bugzilla.suse.com/1225555"
},
{
"category": "self",
"summary": "SUSE Bug 1225556",
"url": "https://bugzilla.suse.com/1225556"
},
{
"category": "self",
"summary": "SUSE Bug 1225559",
"url": "https://bugzilla.suse.com/1225559"
},
{
"category": "self",
"summary": "SUSE Bug 1225569",
"url": "https://bugzilla.suse.com/1225569"
},
{
"category": "self",
"summary": "SUSE Bug 1225571",
"url": "https://bugzilla.suse.com/1225571"
},
{
"category": "self",
"summary": "SUSE Bug 1225573",
"url": "https://bugzilla.suse.com/1225573"
},
{
"category": "self",
"summary": "SUSE Bug 1225577",
"url": "https://bugzilla.suse.com/1225577"
},
{
"category": "self",
"summary": "SUSE Bug 1225583",
"url": "https://bugzilla.suse.com/1225583"
},
{
"category": "self",
"summary": "SUSE Bug 1225585",
"url": "https://bugzilla.suse.com/1225585"
},
{
"category": "self",
"summary": "SUSE Bug 1225593",
"url": "https://bugzilla.suse.com/1225593"
},
{
"category": "self",
"summary": "SUSE Bug 1225599",
"url": "https://bugzilla.suse.com/1225599"
},
{
"category": "self",
"summary": "SUSE Bug 1225602",
"url": "https://bugzilla.suse.com/1225602"
},
{
"category": "self",
"summary": "SUSE Bug 1225611",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "self",
"summary": "SUSE Bug 1225642",
"url": "https://bugzilla.suse.com/1225642"
},
{
"category": "self",
"summary": "SUSE Bug 1225681",
"url": "https://bugzilla.suse.com/1225681"
},
{
"category": "self",
"summary": "SUSE Bug 1225704",
"url": "https://bugzilla.suse.com/1225704"
},
{
"category": "self",
"summary": "SUSE Bug 1225722",
"url": "https://bugzilla.suse.com/1225722"
},
{
"category": "self",
"summary": "SUSE Bug 1225749",
"url": "https://bugzilla.suse.com/1225749"
},
{
"category": "self",
"summary": "SUSE Bug 1225758",
"url": "https://bugzilla.suse.com/1225758"
},
{
"category": "self",
"summary": "SUSE Bug 1225760",
"url": "https://bugzilla.suse.com/1225760"
},
{
"category": "self",
"summary": "SUSE Bug 1225761",
"url": "https://bugzilla.suse.com/1225761"
},
{
"category": "self",
"summary": "SUSE Bug 1225767",
"url": "https://bugzilla.suse.com/1225767"
},
{
"category": "self",
"summary": "SUSE Bug 1225770",
"url": "https://bugzilla.suse.com/1225770"
},
{
"category": "self",
"summary": "SUSE Bug 1225815",
"url": "https://bugzilla.suse.com/1225815"
},
{
"category": "self",
"summary": "SUSE Bug 1225835",
"url": "https://bugzilla.suse.com/1225835"
},
{
"category": "self",
"summary": "SUSE Bug 1225840",
"url": "https://bugzilla.suse.com/1225840"
},
{
"category": "self",
"summary": "SUSE Bug 1225848",
"url": "https://bugzilla.suse.com/1225848"
},
{
"category": "self",
"summary": "SUSE Bug 1225866",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "self",
"summary": "SUSE Bug 1225872",
"url": "https://bugzilla.suse.com/1225872"
},
{
"category": "self",
"summary": "SUSE Bug 1225894",
"url": "https://bugzilla.suse.com/1225894"
},
{
"category": "self",
"summary": "SUSE Bug 1225895",
"url": "https://bugzilla.suse.com/1225895"
},
{
"category": "self",
"summary": "SUSE Bug 1225898",
"url": "https://bugzilla.suse.com/1225898"
},
{
"category": "self",
"summary": "SUSE Bug 1226211",
"url": "https://bugzilla.suse.com/1226211"
},
{
"category": "self",
"summary": "SUSE Bug 1226212",
"url": "https://bugzilla.suse.com/1226212"
},
{
"category": "self",
"summary": "SUSE Bug 1226537",
"url": "https://bugzilla.suse.com/1226537"
},
{
"category": "self",
"summary": "SUSE Bug 1226554",
"url": "https://bugzilla.suse.com/1226554"
},
{
"category": "self",
"summary": "SUSE Bug 1226557",
"url": "https://bugzilla.suse.com/1226557"
},
{
"category": "self",
"summary": "SUSE Bug 1226562",
"url": "https://bugzilla.suse.com/1226562"
},
{
"category": "self",
"summary": "SUSE Bug 1226567",
"url": "https://bugzilla.suse.com/1226567"
},
{
"category": "self",
"summary": "SUSE Bug 1226575",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "self",
"summary": "SUSE Bug 1226577",
"url": "https://bugzilla.suse.com/1226577"
},
{
"category": "self",
"summary": "SUSE Bug 1226593",
"url": "https://bugzilla.suse.com/1226593"
},
{
"category": "self",
"summary": "SUSE Bug 1226595",
"url": "https://bugzilla.suse.com/1226595"
},
{
"category": "self",
"summary": "SUSE Bug 1226597",
"url": "https://bugzilla.suse.com/1226597"
},
{
"category": "self",
"summary": "SUSE Bug 1226610",
"url": "https://bugzilla.suse.com/1226610"
},
{
"category": "self",
"summary": "SUSE Bug 1226614",
"url": "https://bugzilla.suse.com/1226614"
},
{
"category": "self",
"summary": "SUSE Bug 1226619",
"url": "https://bugzilla.suse.com/1226619"
},
{
"category": "self",
"summary": "SUSE Bug 1226621",
"url": "https://bugzilla.suse.com/1226621"
},
{
"category": "self",
"summary": "SUSE Bug 1226634",
"url": "https://bugzilla.suse.com/1226634"
},
{
"category": "self",
"summary": "SUSE Bug 1226637",
"url": "https://bugzilla.suse.com/1226637"
},
{
"category": "self",
"summary": "SUSE Bug 1226670",
"url": "https://bugzilla.suse.com/1226670"
},
{
"category": "self",
"summary": "SUSE Bug 1226672",
"url": "https://bugzilla.suse.com/1226672"
},
{
"category": "self",
"summary": "SUSE Bug 1226692",
"url": "https://bugzilla.suse.com/1226692"
},
{
"category": "self",
"summary": "SUSE Bug 1226698",
"url": "https://bugzilla.suse.com/1226698"
},
{
"category": "self",
"summary": "SUSE Bug 1226699",
"url": "https://bugzilla.suse.com/1226699"
},
{
"category": "self",
"summary": "SUSE Bug 1226701",
"url": "https://bugzilla.suse.com/1226701"
},
{
"category": "self",
"summary": "SUSE Bug 1226705",
"url": "https://bugzilla.suse.com/1226705"
},
{
"category": "self",
"summary": "SUSE Bug 1226708",
"url": "https://bugzilla.suse.com/1226708"
},
{
"category": "self",
"summary": "SUSE Bug 1226711",
"url": "https://bugzilla.suse.com/1226711"
},
{
"category": "self",
"summary": "SUSE Bug 1226712",
"url": "https://bugzilla.suse.com/1226712"
},
{
"category": "self",
"summary": "SUSE Bug 1226716",
"url": "https://bugzilla.suse.com/1226716"
},
{
"category": "self",
"summary": "SUSE Bug 1226718",
"url": "https://bugzilla.suse.com/1226718"
},
{
"category": "self",
"summary": "SUSE Bug 1226732",
"url": "https://bugzilla.suse.com/1226732"
},
{
"category": "self",
"summary": "SUSE Bug 1226735",
"url": "https://bugzilla.suse.com/1226735"
},
{
"category": "self",
"summary": "SUSE Bug 1226744",
"url": "https://bugzilla.suse.com/1226744"
},
{
"category": "self",
"summary": "SUSE Bug 1226746",
"url": "https://bugzilla.suse.com/1226746"
},
{
"category": "self",
"summary": "SUSE Bug 1226747",
"url": "https://bugzilla.suse.com/1226747"
},
{
"category": "self",
"summary": "SUSE Bug 1226749",
"url": "https://bugzilla.suse.com/1226749"
},
{
"category": "self",
"summary": "SUSE Bug 1226754",
"url": "https://bugzilla.suse.com/1226754"
},
{
"category": "self",
"summary": "SUSE Bug 1226757",
"url": "https://bugzilla.suse.com/1226757"
},
{
"category": "self",
"summary": "SUSE Bug 1226767",
"url": "https://bugzilla.suse.com/1226767"
},
{
"category": "self",
"summary": "SUSE Bug 1226769",
"url": "https://bugzilla.suse.com/1226769"
},
{
"category": "self",
"summary": "SUSE Bug 1226857",
"url": "https://bugzilla.suse.com/1226857"
},
{
"category": "self",
"summary": "SUSE Bug 1226861",
"url": "https://bugzilla.suse.com/1226861"
},
{
"category": "self",
"summary": "SUSE Bug 1226876",
"url": "https://bugzilla.suse.com/1226876"
},
{
"category": "self",
"summary": "SUSE Bug 1226883",
"url": "https://bugzilla.suse.com/1226883"
},
{
"category": "self",
"summary": "SUSE Bug 1226886",
"url": "https://bugzilla.suse.com/1226886"
},
{
"category": "self",
"summary": "SUSE Bug 1226895",
"url": "https://bugzilla.suse.com/1226895"
},
{
"category": "self",
"summary": "SUSE Bug 1226948",
"url": "https://bugzilla.suse.com/1226948"
},
{
"category": "self",
"summary": "SUSE Bug 1226949",
"url": "https://bugzilla.suse.com/1226949"
},
{
"category": "self",
"summary": "SUSE Bug 1226950",
"url": "https://bugzilla.suse.com/1226950"
},
{
"category": "self",
"summary": "SUSE Bug 1226962",
"url": "https://bugzilla.suse.com/1226962"
},
{
"category": "self",
"summary": "SUSE Bug 1226976",
"url": "https://bugzilla.suse.com/1226976"
},
{
"category": "self",
"summary": "SUSE Bug 1226994",
"url": "https://bugzilla.suse.com/1226994"
},
{
"category": "self",
"summary": "SUSE Bug 1226996",
"url": "https://bugzilla.suse.com/1226996"
},
{
"category": "self",
"summary": "SUSE Bug 1227101",
"url": "https://bugzilla.suse.com/1227101"
},
{
"category": "self",
"summary": "SUSE Bug 1227407",
"url": "https://bugzilla.suse.com/1227407"
},
{
"category": "self",
"summary": "SUSE Bug 1227435",
"url": "https://bugzilla.suse.com/1227435"
},
{
"category": "self",
"summary": "SUSE Bug 1227487",
"url": "https://bugzilla.suse.com/1227487"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4439 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47103 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47145 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47145/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47191 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47193 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47201 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47201/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47267 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47267/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47270 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47275 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47275/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47293 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47294 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47294/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47297 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47297/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47309 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47328 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47354 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47354/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47372 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47407 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47418 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47418/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47434 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47434/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47438 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47438/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47445 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47445/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47498 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47498/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47518 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47518/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47520 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47520/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47544 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47547 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47547/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47566 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47571 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47587 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47589 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47600 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47602 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47603 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47617 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0435 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22942 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48711 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48715 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48732 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48733 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48740 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48743 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48754 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48756 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48758 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48759 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48760 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48761 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48771 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48772 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-24023 page",
"url": "https://www.suse.com/security/cve/CVE-2023-24023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4244 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4244/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52507 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52622 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52675 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52683 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52683/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52693 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52693/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52737 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52752 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52753 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52754 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52757 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52762 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52764 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52784 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52784/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52808 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52809 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52811 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52817 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52817/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52818 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52819 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52832 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52832/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52834 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52834/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52835 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52843 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52845 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52855 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52881 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26633 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26633/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26635 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26635/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26636 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26636/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26641 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26641/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26679 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26687 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26687/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26720 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26813 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26845 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26863 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26880 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26894 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26894/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26928 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26928/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26973 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27399 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27410 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35247 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35247/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35805 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35807 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35819 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35819/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35822 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35828 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35828/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35835 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35862 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35863 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35864 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35865 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35867 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35868 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35870 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35896 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35922 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35925 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35925/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35930 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35930/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35947 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35947/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35950 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35956 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35956/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35958 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35960 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35960/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35962 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35962/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35976 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35979 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35979/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35997 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35998 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36014 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36016 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36017 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36025 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36025/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36479 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36880 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36894 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36894/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36915 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36915/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36917 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36919 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36934 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36938 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36940 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36941 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36949 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36949/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36950 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36952 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36960 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36960/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36964 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37021 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37354 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37354/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38544 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38546 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38549 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38549/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38552 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38553 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38553/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38565 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38567 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38578 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38579 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38580 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38597 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38598 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38601 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38608 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38618 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38619 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38621 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38627 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38659 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38661 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38661/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38780 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38780/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39301 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-39475 page",
"url": "https://www.suse.com/security/cve/CVE-2024-39475/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-07-18T14:04:33Z",
"generator": {
"date": "2024-07-18T14:04:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2561-1",
"initial_release_date": "2024-07-18T14:04:33Z",
"revision_history": [
{
"date": "2024-07-18T14:04:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.222.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.222.1.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.222.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.222.1.aarch64",
"product_id": "dlm-kmp-default-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.222.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.222.1.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-default-4.12.14-122.222.1.aarch64",
"product_id": "kernel-default-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-122.222.1.aarch64",
"product_id": "kernel-default-base-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-122.222.1.aarch64",
"product_id": "kernel-default-devel-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-122.222.1.aarch64",
"product_id": "kernel-default-extra-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.222.1.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-122.222.1.aarch64",
"product_id": "kernel-obs-build-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.222.1.aarch64",
"product_id": "kernel-obs-qa-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-syms-4.12.14-122.222.1.aarch64",
"product_id": "kernel-syms-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-122.222.1.aarch64",
"product_id": "kernel-vanilla-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.222.1.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.222.1.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.222.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.222.1.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-122.222.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.222.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.222.1.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-122.222.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-122.222.1.noarch",
"product": {
"name": "kernel-devel-4.12.14-122.222.1.noarch",
"product_id": "kernel-devel-4.12.14-122.222.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-122.222.1.noarch",
"product": {
"name": "kernel-docs-4.12.14-122.222.1.noarch",
"product_id": "kernel-docs-4.12.14-122.222.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-122.222.1.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-122.222.1.noarch",
"product_id": "kernel-docs-html-4.12.14-122.222.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-122.222.1.noarch",
"product": {
"name": "kernel-macros-4.12.14-122.222.1.noarch",
"product_id": "kernel-macros-4.12.14-122.222.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-122.222.1.noarch",
"product": {
"name": "kernel-source-4.12.14-122.222.1.noarch",
"product_id": "kernel-source-4.12.14-122.222.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-122.222.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-122.222.1.noarch",
"product_id": "kernel-source-vanilla-4.12.14-122.222.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-debug-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-debug-base-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-default-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-default-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-default-base-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-default-devel-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-default-extra-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-obs-build-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-syms-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-vanilla-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"product_id": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.222.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.222.1.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-122.222.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-122.222.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.222.1.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-122.222.1.s390x",
"product_id": "dlm-kmp-default-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.222.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.222.1.s390x",
"product_id": "gfs2-kmp-default-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-default-4.12.14-122.222.1.s390x",
"product_id": "kernel-default-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-default-base-4.12.14-122.222.1.s390x",
"product_id": "kernel-default-base-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-122.222.1.s390x",
"product_id": "kernel-default-devel-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-122.222.1.s390x",
"product_id": "kernel-default-extra-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.222.1.s390x",
"product_id": "kernel-default-kgraft-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-default-man-4.12.14-122.222.1.s390x",
"product_id": "kernel-default-man-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-122.222.1.s390x",
"product_id": "kernel-obs-build-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-122.222.1.s390x",
"product_id": "kernel-obs-qa-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-syms-4.12.14-122.222.1.s390x",
"product_id": "kernel-syms-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-122.222.1.s390x",
"product_id": "kernel-vanilla-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.222.1.s390x",
"product_id": "kernel-vanilla-base-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.222.1.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-122.222.1.s390x",
"product_id": "kernel-zfcpdump-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-122.222.1.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-122.222.1.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"product": {
"name": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"product_id": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.222.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.222.1.s390x",
"product_id": "kselftests-kmp-default-4.12.14-122.222.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-122.222.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-122.222.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-122.222.1.x86_64",
"product_id": "dlm-kmp-default-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-debug-4.12.14-122.222.1.x86_64",
"product_id": "kernel-debug-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-122.222.1.x86_64",
"product_id": "kernel-debug-base-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-122.222.1.x86_64",
"product_id": "kernel-debug-devel-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-122.222.1.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-default-4.12.14-122.222.1.x86_64",
"product_id": "kernel-default-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-122.222.1.x86_64",
"product_id": "kernel-default-base-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-122.222.1.x86_64",
"product_id": "kernel-default-devel-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-122.222.1.x86_64",
"product_id": "kernel-default-extra-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-122.222.1.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-122.222.1.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-122.222.1.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-122.222.1.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-122.222.1.x86_64",
"product_id": "kernel-obs-build-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-122.222.1.x86_64",
"product_id": "kernel-obs-qa-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-syms-4.12.14-122.222.1.x86_64",
"product_id": "kernel-syms-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-122.222.1.x86_64",
"product_id": "kernel-vanilla-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-122.222.1.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-122.222.1.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"product_id": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-122.222.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-122.222.1.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-122.222.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-122.222.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x"
},
"product_reference": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-122.222.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch"
},
"product_reference": "kernel-docs-4.12.14-122.222.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.222.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-122.222.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.222.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.222.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.222.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.222.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.222.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.222.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.222.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.222.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.222.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.222.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.222.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.222.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.222.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.222.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.222.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64"
},
"product_reference": "kernel-default-4.12.14-122.222.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-default-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-default-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-default-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.222.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-122.222.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-default-base-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.222.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-122.222.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-default-man-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-122.222.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch"
},
"product_reference": "kernel-devel-4.12.14-122.222.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-122.222.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch"
},
"product_reference": "kernel-macros-4.12.14-122.222.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-122.222.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch"
},
"product_reference": "kernel-source-4.12.14-122.222.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.222.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64"
},
"product_reference": "kernel-syms-4.12.14-122.222.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.222.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-122.222.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.222.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x"
},
"product_reference": "kernel-syms-4.12.14-122.222.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-syms-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-4.12.14-122.222.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
},
"product_reference": "kernel-default-extra-4.12.14-122.222.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10135"
}
],
"notes": [
{
"category": "general",
"text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10135",
"url": "https://www.suse.com/security/cve/CVE-2020-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1171988 for CVE-2020-10135",
"url": "https://bugzilla.suse.com/1171988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2020-10135"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2021-4439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: cpai: check ctr-\u003ecnr to avoid array index out of bound\n\nThe cmtp_add_connection() would add a cmtp session to a controller\nand run a kernel thread to process cmtp.\n\n\t__module_get(THIS_MODULE);\n\tsession-\u003etask = kthread_run(cmtp_session, session, \"kcmtpd_ctr_%d\",\n\t\t\t\t\t\t\t\tsession-\u003enum);\n\nDuring this process, the kernel thread would call detach_capi_ctr()\nto detach a register controller. if the controller\nwas not attached yet, detach_capi_ctr() would\ntrigger an array-index-out-bounds bug.\n\n[ 46.866069][ T6479] UBSAN: array-index-out-of-bounds in\ndrivers/isdn/capi/kcapi.c:483:21\n[ 46.867196][ T6479] index -1 is out of range for type \u0027capi_ctr *[32]\u0027\n[ 46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 Not tainted\n5.15.0-rc2+ #8\n[ 46.869002][ T6479] Hardware name: QEMU Standard PC (i440FX + PIIX,\n1996), BIOS 1.14.0-2 04/01/2014\n[ 46.870107][ T6479] Call Trace:\n[ 46.870473][ T6479] dump_stack_lvl+0x57/0x7d\n[ 46.870974][ T6479] ubsan_epilogue+0x5/0x40\n[ 46.871458][ T6479] __ubsan_handle_out_of_bounds.cold+0x43/0x48\n[ 46.872135][ T6479] detach_capi_ctr+0x64/0xc0\n[ 46.872639][ T6479] cmtp_session+0x5c8/0x5d0\n[ 46.873131][ T6479] ? __init_waitqueue_head+0x60/0x60\n[ 46.873712][ T6479] ? cmtp_add_msgpart+0x120/0x120\n[ 46.874256][ T6479] kthread+0x147/0x170\n[ 46.874709][ T6479] ? set_kthread_struct+0x40/0x40\n[ 46.875248][ T6479] ret_from_fork+0x1f/0x30\n[ 46.875773][ T6479]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4439",
"url": "https://www.suse.com/security/cve/CVE-2021-4439"
},
{
"category": "external",
"summary": "SUSE Bug 1226670 for CVE-2021-4439",
"url": "https://bugzilla.suse.com/1226670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-4439"
},
{
"cve": "CVE-2021-47103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: fully convert sk-\u003esk_rx_dst to RCU rules\n\nsyzbot reported various issues around early demux,\none being included in this changelog [1]\n\nsk-\u003esk_rx_dst is using RCU protection without clearly\ndocumenting it.\n\nAnd following sequences in tcp_v4_do_rcv()/tcp_v6_do_rcv()\nare not following standard RCU rules.\n\n[a] dst_release(dst);\n[b] sk-\u003esk_rx_dst = NULL;\n\nThey look wrong because a delete operation of RCU protected\npointer is supposed to clear the pointer before\nthe call_rcu()/synchronize_rcu() guarding actual memory freeing.\n\nIn some cases indeed, dst could be freed before [b] is done.\n\nWe could cheat by clearing sk_rx_dst before calling\ndst_release(), but this seems the right time to stick\nto standard RCU annotations and debugging facilities.\n\n[1]\nBUG: KASAN: use-after-free in dst_check include/net/dst.h:470 [inline]\nBUG: KASAN: use-after-free in tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792\nRead of size 2 at addr ffff88807f1cb73a by task syz-executor.5/9204\n\nCPU: 0 PID: 9204 Comm: syz-executor.5 Not tainted 5.16.0-rc5-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247\n __kasan_report mm/kasan/report.c:433 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:450\n dst_check include/net/dst.h:470 [inline]\n tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792\n ip_rcv_finish_core.constprop.0+0x15de/0x1e80 net/ipv4/ip_input.c:340\n ip_list_rcv_finish.constprop.0+0x1b2/0x6e0 net/ipv4/ip_input.c:583\n ip_sublist_rcv net/ipv4/ip_input.c:609 [inline]\n ip_list_rcv+0x34e/0x490 net/ipv4/ip_input.c:644\n __netif_receive_skb_list_ptype net/core/dev.c:5508 [inline]\n __netif_receive_skb_list_core+0x549/0x8e0 net/core/dev.c:5556\n __netif_receive_skb_list net/core/dev.c:5608 [inline]\n netif_receive_skb_list_internal+0x75e/0xd80 net/core/dev.c:5699\n gro_normal_list net/core/dev.c:5853 [inline]\n gro_normal_list net/core/dev.c:5849 [inline]\n napi_complete_done+0x1f1/0x880 net/core/dev.c:6590\n virtqueue_napi_complete drivers/net/virtio_net.c:339 [inline]\n virtnet_poll+0xca2/0x11b0 drivers/net/virtio_net.c:1557\n __napi_poll+0xaf/0x440 net/core/dev.c:7023\n napi_poll net/core/dev.c:7090 [inline]\n net_rx_action+0x801/0xb40 net/core/dev.c:7177\n __do_softirq+0x29b/0x9c2 kernel/softirq.c:558\n invoke_softirq kernel/softirq.c:432 [inline]\n __irq_exit_rcu+0x123/0x180 kernel/softirq.c:637\n irq_exit_rcu+0x5/0x20 kernel/softirq.c:649\n common_interrupt+0x52/0xc0 arch/x86/kernel/irq.c:240\n asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:629\nRIP: 0033:0x7f5e972bfd57\nCode: 39 d1 73 14 0f 1f 80 00 00 00 00 48 8b 50 f8 48 83 e8 08 48 39 ca 77 f3 48 39 c3 73 3e 48 89 13 48 8b 50 f8 48 89 38 49 8b 0e \u003c48\u003e 8b 3e 48 83 c3 08 48 83 c6 08 eb bc 48 39 d1 72 9e 48 39 d0 73\nRSP: 002b:00007fff8a413210 EFLAGS: 00000283\nRAX: 00007f5e97108990 RBX: 00007f5e97108338 RCX: ffffffff81d3aa45\nRDX: ffffffff81d3aa45 RSI: 00007f5e97108340 RDI: ffffffff81d3aa45\nRBP: 00007f5e97107eb8 R08: 00007f5e97108d88 R09: 0000000093c2e8d9\nR10: 0000000000000000 R11: 0000000000000000 R12: 00007f5e97107eb0\nR13: 00007f5e97108338 R14: 00007f5e97107ea8 R15: 0000000000000019\n \u003c/TASK\u003e\n\nAllocated by task 13:\n kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38\n kasan_set_track mm/kasan/common.c:46 [inline]\n set_alloc_info mm/kasan/common.c:434 [inline]\n __kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:467\n kasan_slab_alloc include/linux/kasan.h:259 [inline]\n slab_post_alloc_hook mm/slab.h:519 [inline]\n slab_alloc_node mm/slub.c:3234 [inline]\n slab_alloc mm/slub.c:3242 [inline]\n kmem_cache_alloc+0x202/0x3a0 mm/slub.c:3247\n dst_alloc+0x146/0x1f0 net/core/dst.c:92\n rt_dst_alloc+0x73/0x430 net/ipv4/route.c:1613\n ip_route_input_slow+0x1817/0x3a20 net/ipv4/route.c:234\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47103",
"url": "https://www.suse.com/security/cve/CVE-2021-47103"
},
{
"category": "external",
"summary": "SUSE Bug 1221010 for CVE-2021-47103",
"url": "https://bugzilla.suse.com/1221010"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47103"
},
{
"cve": "CVE-2021-47145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: do not BUG_ON in link_to_fixup_dir\n\nWhile doing error injection testing I got the following panic\n\n kernel BUG at fs/btrfs/tree-log.c:1862!\n invalid opcode: 0000 [#1] SMP NOPTI\n CPU: 1 PID: 7836 Comm: mount Not tainted 5.13.0-rc1+ #305\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 04/01/2014\n RIP: 0010:link_to_fixup_dir+0xd5/0xe0\n RSP: 0018:ffffb5800180fa30 EFLAGS: 00010216\n RAX: fffffffffffffffb RBX: 00000000fffffffb RCX: ffff8f595287faf0\n RDX: ffffb5800180fa37 RSI: ffff8f5954978800 RDI: 0000000000000000\n RBP: ffff8f5953af9450 R08: 0000000000000019 R09: 0000000000000001\n R10: 000151f408682970 R11: 0000000120021001 R12: ffff8f5954978800\n R13: ffff8f595287faf0 R14: ffff8f5953c77dd0 R15: 0000000000000065\n FS: 00007fc5284c8c40(0000) GS:ffff8f59bbd00000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007fc5287f47c0 CR3: 000000011275e002 CR4: 0000000000370ee0\n Call Trace:\n replay_one_buffer+0x409/0x470\n ? btree_read_extent_buffer_pages+0xd0/0x110\n walk_up_log_tree+0x157/0x1e0\n walk_log_tree+0xa6/0x1d0\n btrfs_recover_log_trees+0x1da/0x360\n ? replay_one_extent+0x7b0/0x7b0\n open_ctree+0x1486/0x1720\n btrfs_mount_root.cold+0x12/0xea\n ? __kmalloc_track_caller+0x12f/0x240\n legacy_get_tree+0x24/0x40\n vfs_get_tree+0x22/0xb0\n vfs_kern_mount.part.0+0x71/0xb0\n btrfs_mount+0x10d/0x380\n ? vfs_parse_fs_string+0x4d/0x90\n legacy_get_tree+0x24/0x40\n vfs_get_tree+0x22/0xb0\n path_mount+0x433/0xa10\n __x64_sys_mount+0xe3/0x120\n do_syscall_64+0x3d/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nWe can get -EIO or any number of legitimate errors from\nbtrfs_search_slot(), panicing here is not the appropriate response. The\nerror path for this code handles errors properly, simply return the\nerror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47145",
"url": "https://www.suse.com/security/cve/CVE-2021-47145"
},
{
"category": "external",
"summary": "SUSE Bug 1222005 for CVE-2021-47145",
"url": "https://bugzilla.suse.com/1222005"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47145"
},
{
"cve": "CVE-2021-47191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_readcap16()\n\nThe following warning was observed running syzkaller:\n\n[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;\n[ 3813.830724] program syz-executor not setting count and/or reply_len properly\n[ 3813.836956] ==================================================================\n[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0\n[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549\n[ 3813.846612] Call Trace:\n[ 3813.846995] dump_stack+0x108/0x15f\n[ 3813.847524] print_address_description+0xa5/0x372\n[ 3813.848243] kasan_report.cold+0x236/0x2a8\n[ 3813.849439] check_memory_region+0x240/0x270\n[ 3813.850094] memcpy+0x30/0x80\n[ 3813.850553] sg_copy_buffer+0x157/0x1e0\n[ 3813.853032] sg_copy_from_buffer+0x13/0x20\n[ 3813.853660] fill_from_dev_buffer+0x135/0x370\n[ 3813.854329] resp_readcap16+0x1ac/0x280\n[ 3813.856917] schedule_resp+0x41f/0x1630\n[ 3813.858203] scsi_debug_queuecommand+0xb32/0x17e0\n[ 3813.862699] scsi_dispatch_cmd+0x330/0x950\n[ 3813.863329] scsi_request_fn+0xd8e/0x1710\n[ 3813.863946] __blk_run_queue+0x10b/0x230\n[ 3813.864544] blk_execute_rq_nowait+0x1d8/0x400\n[ 3813.865220] sg_common_write.isra.0+0xe61/0x2420\n[ 3813.871637] sg_write+0x6c8/0xef0\n[ 3813.878853] __vfs_write+0xe4/0x800\n[ 3813.883487] vfs_write+0x17b/0x530\n[ 3813.884008] ksys_write+0x103/0x270\n[ 3813.886268] __x64_sys_write+0x77/0xc0\n[ 3813.886841] do_syscall_64+0x106/0x360\n[ 3813.887415] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThis issue can be reproduced with the following syzkaller log:\n\nr0 = openat(0xffffffffffffff9c, \u0026(0x7f0000000040)=\u0027./file0\\x00\u0027, 0x26e1, 0x0)\nr1 = syz_open_procfs(0xffffffffffffffff, \u0026(0x7f0000000000)=\u0027fd/3\\x00\u0027)\nopen_by_handle_at(r1, \u0026(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)\nr2 = syz_open_dev$sg(\u0026(0x7f0000000000), 0x0, 0x40782)\nwrite$binfmt_aout(r2, \u0026(0x7f0000000340)=ANY=[@ANYBLOB=\"00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d\"], 0x126)\n\nIn resp_readcap16() we get \"int alloc_len\" value -1104926854, and then pass\nthe huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This\nleads to OOB in sg_copy_buffer().\n\nTo solve this issue, define alloc_len as u32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47191",
"url": "https://www.suse.com/security/cve/CVE-2021-47191"
},
{
"category": "external",
"summary": "SUSE Bug 1222866 for CVE-2021-47191",
"url": "https://bugzilla.suse.com/1222866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47191"
},
{
"cve": "CVE-2021-47193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47193"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix memory leak during rmmod\n\nDriver failed to release all memory allocated. This would lead to memory\nleak during driver removal.\n\nProperly free memory when the module is removed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47193",
"url": "https://www.suse.com/security/cve/CVE-2021-47193"
},
{
"category": "external",
"summary": "SUSE Bug 1222879 for CVE-2021-47193",
"url": "https://bugzilla.suse.com/1222879"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47193"
},
{
"cve": "CVE-2021-47201",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47201"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: free q_vectors before queues in iavf_disable_vf\n\niavf_free_queues() clears adapter-\u003enum_active_queues, which\niavf_free_q_vectors() relies on, so swap the order of these two function\ncalls in iavf_disable_vf(). This resolves a panic encountered when the\ninterface is disabled and then later brought up again after PF\ncommunication is restored.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47201",
"url": "https://www.suse.com/security/cve/CVE-2021-47201"
},
{
"category": "external",
"summary": "SUSE Bug 1222792 for CVE-2021-47201",
"url": "https://bugzilla.suse.com/1222792"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47201"
},
{
"cve": "CVE-2021-47267",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47267"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: fix various gadget panics on 10gbps cabling\n\nusb_assign_descriptors() is called with 5 parameters,\nthe last 4 of which are the usb_descriptor_header for:\n full-speed (USB1.1 - 12Mbps [including USB1.0 low-speed @ 1.5Mbps),\n high-speed (USB2.0 - 480Mbps),\n super-speed (USB3.0 - 5Gbps),\n super-speed-plus (USB3.1 - 10Gbps).\n\nThe differences between full/high/super-speed descriptors are usually\nsubstantial (due to changes in the maximum usb block size from 64 to 512\nto 1024 bytes and other differences in the specs), while the difference\nbetween 5 and 10Gbps descriptors may be as little as nothing\n(in many cases the same tuning is simply good enough).\n\nHowever if a gadget driver calls usb_assign_descriptors() with\na NULL descriptor for super-speed-plus and is then used on a max 10gbps\nconfiguration, the kernel will crash with a null pointer dereference,\nwhen a 10gbps capable device port + cable + host port combination shows up.\n(This wouldn\u0027t happen if the gadget max-speed was set to 5gbps, but\nit of course defaults to the maximum, and there\u0027s no real reason to\nartificially limit it)\n\nThe fix is to simply use the 5gbps descriptor as the 10gbps descriptor,\nif a 10gbps descriptor wasn\u0027t provided.\n\nObviously this won\u0027t fix the problem if the 5gbps descriptor is also\nNULL, but such cases can\u0027t be so trivially solved (and any such gadgets\nare unlikely to be used with USB3 ports any way).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47267",
"url": "https://www.suse.com/security/cve/CVE-2021-47267"
},
{
"category": "external",
"summary": "SUSE Bug 1224993 for CVE-2021-47267",
"url": "https://bugzilla.suse.com/1224993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47267"
},
{
"cve": "CVE-2021-47270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47270"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: fix various gadgets null ptr deref on 10gbps cabling.\n\nThis avoids a null pointer dereference in\nf_{ecm,eem,hid,loopback,printer,rndis,serial,sourcesink,subset,tcm}\nby simply reusing the 5gbps config for 10gbps.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47270",
"url": "https://www.suse.com/security/cve/CVE-2021-47270"
},
{
"category": "external",
"summary": "SUSE Bug 1224997 for CVE-2021-47270",
"url": "https://bugzilla.suse.com/1224997"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47270"
},
{
"cve": "CVE-2021-47275",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47275"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbcache: avoid oversized read request in cache missing code path\n\nIn the cache missing code path of cached device, if a proper location\nfrom the internal B+ tree is matched for a cache miss range, function\ncached_dev_cache_miss() will be called in cache_lookup_fn() in the\nfollowing code block,\n[code block 1]\n 526 unsigned int sectors = KEY_INODE(k) == s-\u003eiop.inode\n 527 ? min_t(uint64_t, INT_MAX,\n 528 KEY_START(k) - bio-\u003ebi_iter.bi_sector)\n 529 : INT_MAX;\n 530 int ret = s-\u003ed-\u003ecache_miss(b, s, bio, sectors);\n\nHere s-\u003ed-\u003ecache_miss() is the call backfunction pointer initialized as\ncached_dev_cache_miss(), the last parameter \u0027sectors\u0027 is an important\nhint to calculate the size of read request to backing device of the\nmissing cache data.\n\nCurrent calculation in above code block may generate oversized value of\n\u0027sectors\u0027, which consequently may trigger 2 different potential kernel\npanics by BUG() or BUG_ON() as listed below,\n\n1) BUG_ON() inside bch_btree_insert_key(),\n[code block 2]\n 886 BUG_ON(b-\u003eops-\u003eis_extents \u0026\u0026 !KEY_SIZE(k));\n2) BUG() inside biovec_slab(),\n[code block 3]\n 51 default:\n 52 BUG();\n 53 return NULL;\n\nAll the above panics are original from cached_dev_cache_miss() by the\noversized parameter \u0027sectors\u0027.\n\nInside cached_dev_cache_miss(), parameter \u0027sectors\u0027 is used to calculate\nthe size of data read from backing device for the cache missing. This\nsize is stored in s-\u003einsert_bio_sectors by the following lines of code,\n[code block 4]\n 909 s-\u003einsert_bio_sectors = min(sectors, bio_sectors(bio) + reada);\n\nThen the actual key inserting to the internal B+ tree is generated and\nstored in s-\u003eiop.replace_key by the following lines of code,\n[code block 5]\n 911 s-\u003eiop.replace_key = KEY(s-\u003eiop.inode,\n 912 bio-\u003ebi_iter.bi_sector + s-\u003einsert_bio_sectors,\n 913 s-\u003einsert_bio_sectors);\nThe oversized parameter \u0027sectors\u0027 may trigger panic 1) by BUG_ON() from\nthe above code block.\n\nAnd the bio sending to backing device for the missing data is allocated\nwith hint from s-\u003einsert_bio_sectors by the following lines of code,\n[code block 6]\n 926 cache_bio = bio_alloc_bioset(GFP_NOWAIT,\n 927 DIV_ROUND_UP(s-\u003einsert_bio_sectors, PAGE_SECTORS),\n 928 \u0026dc-\u003edisk.bio_split);\nThe oversized parameter \u0027sectors\u0027 may trigger panic 2) by BUG() from the\nagove code block.\n\nNow let me explain how the panics happen with the oversized \u0027sectors\u0027.\nIn code block 5, replace_key is generated by macro KEY(). From the\ndefinition of macro KEY(),\n[code block 7]\n 71 #define KEY(inode, offset, size) \\\n 72 ((struct bkey) { \\\n 73 .high = (1ULL \u003c\u003c 63) | ((__u64) (size) \u003c\u003c 20) | (inode), \\\n 74 .low = (offset) \\\n 75 })\n\nHere \u0027size\u0027 is 16bits width embedded in 64bits member \u0027high\u0027 of struct\nbkey. But in code block 1, if \"KEY_START(k) - bio-\u003ebi_iter.bi_sector\" is\nvery probably to be larger than (1\u003c\u003c16) - 1, which makes the bkey size\ncalculation in code block 5 is overflowed. In one bug report the value\nof parameter \u0027sectors\u0027 is 131072 (= 1 \u003c\u003c 17), the overflowed \u0027sectors\u0027\nresults the overflowed s-\u003einsert_bio_sectors in code block 4, then makes\nsize field of s-\u003eiop.replace_key to be 0 in code block 5. Then the 0-\nsized s-\u003eiop.replace_key is inserted into the internal B+ tree as cache\nmissing check key (a special key to detect and avoid a racing between\nnormal write request and cache missing read request) as,\n[code block 8]\n 915 ret = bch_btree_insert_check_key(b, \u0026s-\u003eop, \u0026s-\u003eiop.replace_key);\n\nThen the 0-sized s-\u003eiop.replace_key as 3rd parameter triggers the bkey\nsize check BUG_ON() in code block 2, and causes the kernel panic 1).\n\nAnother ke\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47275",
"url": "https://www.suse.com/security/cve/CVE-2021-47275"
},
{
"category": "external",
"summary": "SUSE Bug 1224965 for CVE-2021-47275",
"url": "https://bugzilla.suse.com/1224965"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47275"
},
{
"cve": "CVE-2021-47293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47293"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_skbmod: Skip non-Ethernet packets\n\nCurrently tcf_skbmod_act() assumes that packets use Ethernet as their L2\nprotocol, which is not always the case. As an example, for CAN devices:\n\n\t$ ip link add dev vcan0 type vcan\n\t$ ip link set up vcan0\n\t$ tc qdisc add dev vcan0 root handle 1: htb\n\t$ tc filter add dev vcan0 parent 1: protocol ip prio 10 \\\n\t\tmatchall action skbmod swap mac\n\nDoing the above silently corrupts all the packets. Do not perform skbmod\nactions for non-Ethernet packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47293",
"url": "https://www.suse.com/security/cve/CVE-2021-47293"
},
{
"category": "external",
"summary": "SUSE Bug 1224978 for CVE-2021-47293",
"url": "https://bugzilla.suse.com/1224978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47293"
},
{
"cve": "CVE-2021-47294",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47294"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Decrease sock refcount when sock timers expire\n\nCommit 63346650c1a9 (\"netrom: switch to sock timer API\") switched to use\nsock timer API. It replaces mod_timer() by sk_reset_timer(), and\ndel_timer() by sk_stop_timer().\n\nFunction sk_reset_timer() will increase the refcount of sock if it is\ncalled on an inactive timer, hence, in case the timer expires, we need to\ndecrease the refcount ourselves in the handler, otherwise, the sock\nrefcount will be unbalanced and the sock will never be freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47294",
"url": "https://www.suse.com/security/cve/CVE-2021-47294"
},
{
"category": "external",
"summary": "SUSE Bug 1224977 for CVE-2021-47294",
"url": "https://bugzilla.suse.com/1224977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47294"
},
{
"cve": "CVE-2021-47297",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47297"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix uninit-value in caif_seqpkt_sendmsg\n\nWhen nr_segs equal to zero in iovec_from_user, the object\nmsg-\u003emsg_iter.iov is uninit stack memory in caif_seqpkt_sendmsg\nwhich is defined in ___sys_sendmsg. So we cann\u0027t just judge\nmsg-\u003emsg_iter.iov-\u003ebase directlly. We can use nr_segs to judge\nmsg in caif_seqpkt_sendmsg whether has data buffers.\n\n=====================================================\nBUG: KMSAN: uninit-value in caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x1c9/0x220 lib/dump_stack.c:118\n kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:118\n __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215\n caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542\n sock_sendmsg_nosec net/socket.c:652 [inline]\n sock_sendmsg net/socket.c:672 [inline]\n ____sys_sendmsg+0x12b6/0x1350 net/socket.c:2343\n ___sys_sendmsg net/socket.c:2397 [inline]\n __sys_sendmmsg+0x808/0xc90 net/socket.c:2480\n __compat_sys_sendmmsg net/compat.c:656 [inline]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47297",
"url": "https://www.suse.com/security/cve/CVE-2021-47297"
},
{
"category": "external",
"summary": "SUSE Bug 1224976 for CVE-2021-47297",
"url": "https://bugzilla.suse.com/1224976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47297"
},
{
"cve": "CVE-2021-47309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47309"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: validate lwtstate-\u003edata before returning from skb_tunnel_info()\n\nskb_tunnel_info() returns pointer of lwtstate-\u003edata as ip_tunnel_info\ntype without validation. lwtstate-\u003edata can have various types such as\nmpls_iptunnel_encap, etc and these are not compatible.\nSo skb_tunnel_info() should validate before returning that pointer.\n\nSplat looks like:\nBUG: KASAN: slab-out-of-bounds in vxlan_get_route+0x418/0x4b0 [vxlan]\nRead of size 2 at addr ffff888106ec2698 by task ping/811\n\nCPU: 1 PID: 811 Comm: ping Not tainted 5.13.0+ #1195\nCall Trace:\n dump_stack_lvl+0x56/0x7b\n print_address_description.constprop.8.cold.13+0x13/0x2ee\n ? vxlan_get_route+0x418/0x4b0 [vxlan]\n ? vxlan_get_route+0x418/0x4b0 [vxlan]\n kasan_report.cold.14+0x83/0xdf\n ? vxlan_get_route+0x418/0x4b0 [vxlan]\n vxlan_get_route+0x418/0x4b0 [vxlan]\n [ ... ]\n vxlan_xmit_one+0x148b/0x32b0 [vxlan]\n [ ... ]\n vxlan_xmit+0x25c5/0x4780 [vxlan]\n [ ... ]\n dev_hard_start_xmit+0x1ae/0x6e0\n __dev_queue_xmit+0x1f39/0x31a0\n [ ... ]\n neigh_xmit+0x2f9/0x940\n mpls_xmit+0x911/0x1600 [mpls_iptunnel]\n lwtunnel_xmit+0x18f/0x450\n ip_finish_output2+0x867/0x2040\n [ ... ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47309",
"url": "https://www.suse.com/security/cve/CVE-2021-47309"
},
{
"category": "external",
"summary": "SUSE Bug 1224967 for CVE-2021-47309",
"url": "https://bugzilla.suse.com/1224967"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47309"
},
{
"cve": "CVE-2021-47328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47328"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix conn use after free during resets\n\nIf we haven\u0027t done a unbind target call we can race where\niscsi_conn_teardown wakes up the EH thread and then frees the conn while\nthose threads are still accessing the conn ehwait.\n\nWe can only do one TMF per session so this just moves the TMF fields from\nthe conn to the session. We can then rely on the\niscsi_session_teardown-\u003eiscsi_remove_session-\u003e__iscsi_unbind_session call\nto remove the target and it\u0027s devices, and know after that point there is\nno device or scsi-ml callout trying to access the session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47328",
"url": "https://www.suse.com/security/cve/CVE-2021-47328"
},
{
"category": "external",
"summary": "SUSE Bug 1225047 for CVE-2021-47328",
"url": "https://bugzilla.suse.com/1225047"
},
{
"category": "external",
"summary": "SUSE Bug 1225080 for CVE-2021-47328",
"url": "https://bugzilla.suse.com/1225080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47328"
},
{
"cve": "CVE-2021-47354",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47354"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Avoid data corruptions\n\nWait for all dependencies of a job to complete before\nkilling it to avoid data corruptions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47354",
"url": "https://www.suse.com/security/cve/CVE-2021-47354"
},
{
"category": "external",
"summary": "SUSE Bug 1225140 for CVE-2021-47354",
"url": "https://bugzilla.suse.com/1225140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47354"
},
{
"cve": "CVE-2021-47372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47372"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix use after free on rmmod\n\nplat_dev-\u003edev-\u003eplatform_data is released by platform_device_unregister(),\nuse of pclk and hclk is a use-after-free. Since device unregister won\u0027t\nneed a clk device we adjust the function call sequence to fix this issue.\n\n[ 31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci]\n[ 31.275563] Freed by task 306:\n[ 30.276782] platform_device_release+0x25/0x80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47372",
"url": "https://www.suse.com/security/cve/CVE-2021-47372"
},
{
"category": "external",
"summary": "SUSE Bug 1225184 for CVE-2021-47372",
"url": "https://bugzilla.suse.com/1225184"
},
{
"category": "external",
"summary": "SUSE Bug 1229946 for CVE-2021-47372",
"url": "https://bugzilla.suse.com/1229946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2021-47372"
},
{
"cve": "CVE-2021-47379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd\n\nKASAN reports a use-after-free report when doing fuzz test:\n\n[693354.104835] ==================================================================\n[693354.105094] BUG: KASAN: use-after-free in bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105336] Read of size 4 at addr ffff888be0a35664 by task sh/1453338\n\n[693354.105607] CPU: 41 PID: 1453338 Comm: sh Kdump: loaded Not tainted 4.18.0-147\n[693354.105610] Hardware name: Huawei 2288H V5/BC11SPSCB0, BIOS 0.81 07/02/2018\n[693354.105612] Call Trace:\n[693354.105621] dump_stack+0xf1/0x19b\n[693354.105626] ? show_regs_print_info+0x5/0x5\n[693354.105634] ? printk+0x9c/0xc3\n[693354.105638] ? cpumask_weight+0x1f/0x1f\n[693354.105648] print_address_description+0x70/0x360\n[693354.105654] kasan_report+0x1b2/0x330\n[693354.105659] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105665] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105670] bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105675] ? bfq_cpd_init+0x20/0x20\n[693354.105683] cgroup_file_write+0x3aa/0x510\n[693354.105693] ? ___slab_alloc+0x507/0x540\n[693354.105698] ? cgroup_file_poll+0x60/0x60\n[693354.105702] ? 0xffffffff89600000\n[693354.105708] ? usercopy_abort+0x90/0x90\n[693354.105716] ? mutex_lock+0xef/0x180\n[693354.105726] kernfs_fop_write+0x1ab/0x280\n[693354.105732] ? cgroup_file_poll+0x60/0x60\n[693354.105738] vfs_write+0xe7/0x230\n[693354.105744] ksys_write+0xb0/0x140\n[693354.105749] ? __ia32_sys_read+0x50/0x50\n[693354.105760] do_syscall_64+0x112/0x370\n[693354.105766] ? syscall_return_slowpath+0x260/0x260\n[693354.105772] ? do_page_fault+0x9b/0x270\n[693354.105779] ? prepare_exit_to_usermode+0xf9/0x1a0\n[693354.105784] ? enter_from_user_mode+0x30/0x30\n[693354.105793] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.105875] Allocated by task 1453337:\n[693354.106001] kasan_kmalloc+0xa0/0xd0\n[693354.106006] kmem_cache_alloc_node_trace+0x108/0x220\n[693354.106010] bfq_pd_alloc+0x96/0x120\n[693354.106015] blkcg_activate_policy+0x1b7/0x2b0\n[693354.106020] bfq_create_group_hierarchy+0x1e/0x80\n[693354.106026] bfq_init_queue+0x678/0x8c0\n[693354.106031] blk_mq_init_sched+0x1f8/0x460\n[693354.106037] elevator_switch_mq+0xe1/0x240\n[693354.106041] elevator_switch+0x25/0x40\n[693354.106045] elv_iosched_store+0x1a1/0x230\n[693354.106049] queue_attr_store+0x78/0xb0\n[693354.106053] kernfs_fop_write+0x1ab/0x280\n[693354.106056] vfs_write+0xe7/0x230\n[693354.106060] ksys_write+0xb0/0x140\n[693354.106064] do_syscall_64+0x112/0x370\n[693354.106069] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106114] Freed by task 1453336:\n[693354.106225] __kasan_slab_free+0x130/0x180\n[693354.106229] kfree+0x90/0x1b0\n[693354.106233] blkcg_deactivate_policy+0x12c/0x220\n[693354.106238] bfq_exit_queue+0xf5/0x110\n[693354.106241] blk_mq_exit_sched+0x104/0x130\n[693354.106245] __elevator_exit+0x45/0x60\n[693354.106249] elevator_switch_mq+0xd6/0x240\n[693354.106253] elevator_switch+0x25/0x40\n[693354.106257] elv_iosched_store+0x1a1/0x230\n[693354.106261] queue_attr_store+0x78/0xb0\n[693354.106264] kernfs_fop_write+0x1ab/0x280\n[693354.106268] vfs_write+0xe7/0x230\n[693354.106271] ksys_write+0xb0/0x140\n[693354.106275] do_syscall_64+0x112/0x370\n[693354.106280] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106329] The buggy address belongs to the object at ffff888be0a35580\n which belongs to the cache kmalloc-1k of size 1024\n[693354.106736] The buggy address is located 228 bytes inside of\n 1024-byte region [ffff888be0a35580, ffff888be0a35980)\n[693354.107114] The buggy address belongs to the page:\n[693354.107273] page:ffffea002f828c00 count:1 mapcount:0 mapping:ffff888107c17080 index:0x0 compound_mapcount: 0\n[693354.107606] flags: 0x17ffffc0008100(slab|head)\n[693354.107760] raw: 0017ffffc0008100 ffffea002fcbc808 ffffea0030bd3a08 ffff888107c17080\n[693354.108020] r\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47379",
"url": "https://www.suse.com/security/cve/CVE-2021-47379"
},
{
"category": "external",
"summary": "SUSE Bug 1225203 for CVE-2021-47379",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "external",
"summary": "SUSE Bug 1225204 for CVE-2021-47379",
"url": "https://bugzilla.suse.com/1225204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47379"
},
{
"cve": "CVE-2021-47407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47407"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Handle SRCU initialization failure during page track init\n\nCheck the return of init_srcu_struct(), which can fail due to OOM, when\ninitializing the page track mechanism. Lack of checking leads to a NULL\npointer deref found by a modified syzkaller.\n\n[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47407",
"url": "https://www.suse.com/security/cve/CVE-2021-47407"
},
{
"category": "external",
"summary": "SUSE Bug 1225306 for CVE-2021-47407",
"url": "https://bugzilla.suse.com/1225306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47407"
},
{
"cve": "CVE-2021-47418",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47418"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: fix NULL deref in fifo_set_limit()\n\nsyzbot reported another NULL deref in fifo_set_limit() [1]\n\nI could repro the issue with :\n\nunshare -n\ntc qd add dev lo root handle 1:0 tbf limit 200000 burst 70000 rate 100Mbit\ntc qd replace dev lo parent 1:0 pfifo_fast\ntc qd change dev lo root handle 1:0 tbf limit 300000 burst 70000 rate 100Mbit\n\npfifo_fast does not have a change() operation.\nMake fifo_set_limit() more robust about this.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 1cf99067 P4D 1cf99067 PUD 7ca49067 PMD 0\nOops: 0010 [#1] PREEMPT SMP KASAN\nCPU: 1 PID: 14443 Comm: syz-executor959 Not tainted 5.15.0-rc3-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:0x0\nCode: Unable to access opcode bytes at RIP 0xffffffffffffffd6.\nRSP: 0018:ffffc9000e2f7310 EFLAGS: 00010246\nRAX: dffffc0000000000 RBX: ffffffff8d6ecc00 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffff888024c27910 RDI: ffff888071e34000\nRBP: ffff888071e34000 R08: 0000000000000001 R09: ffffffff8fcfb947\nR10: 0000000000000001 R11: 0000000000000000 R12: ffff888024c27910\nR13: ffff888071e34018 R14: 0000000000000000 R15: ffff88801ef74800\nFS: 00007f321d897700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffffffffffffd6 CR3: 00000000722c3000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n fifo_set_limit net/sched/sch_fifo.c:242 [inline]\n fifo_set_limit+0x198/0x210 net/sched/sch_fifo.c:227\n tbf_change+0x6ec/0x16d0 net/sched/sch_tbf.c:418\n qdisc_change net/sched/sch_api.c:1332 [inline]\n tc_modify_qdisc+0xd9a/0x1a60 net/sched/sch_api.c:1634\n rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5572\n netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504\n netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]\n netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340\n netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929\n sock_sendmsg_nosec net/socket.c:704 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:724\n ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409\n ___sys_sendmsg+0xf3/0x170 net/socket.c:2463\n __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47418",
"url": "https://www.suse.com/security/cve/CVE-2021-47418"
},
{
"category": "external",
"summary": "SUSE Bug 1225337 for CVE-2021-47418",
"url": "https://bugzilla.suse.com/1225337"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47418"
},
{
"cve": "CVE-2021-47434",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47434"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: Fix command ring pointer corruption while aborting a command\n\nThe command ring pointer is located at [6:63] bits of the command\nring control register (CRCR). All the control bits like command stop,\nabort are located at [0:3] bits. While aborting a command, we read the\nCRCR and set the abort bit and write to the CRCR. The read will always\ngive command ring pointer as all zeros. So we essentially write only\nthe control bits. Since we split the 64 bit write into two 32 bit writes,\nthere is a possibility of xHC command ring stopped before the upper\ndword (all zeros) is written. If that happens, xHC updates the upper\ndword of its internal command ring pointer with all zeros. Next time,\nwhen the command ring is restarted, we see xHC memory access failures.\nFix this issue by only writing to the lower dword of CRCR where all\ncontrol bits are located.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47434",
"url": "https://www.suse.com/security/cve/CVE-2021-47434"
},
{
"category": "external",
"summary": "SUSE Bug 1225232 for CVE-2021-47434",
"url": "https://bugzilla.suse.com/1225232"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47434"
},
{
"cve": "CVE-2021-47438",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47438"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path\n\nPrior to this patch in case mlx5_core_destroy_cq() failed it returns\nwithout completing all destroy operations and that leads to memory leak.\nInstead, complete the destroy flow before return error.\n\nAlso move mlx5_debug_cq_remove() to the beginning of mlx5_core_destroy_cq()\nto be symmetrical with mlx5_core_create_cq().\n\nkmemleak complains on:\n\nunreferenced object 0xc000000038625100 (size 64):\n comm \"ethtool\", pid 28301, jiffies 4298062946 (age 785.380s)\n hex dump (first 32 bytes):\n 60 01 48 94 00 00 00 c0 b8 05 34 c3 00 00 00 c0 `.H.......4.....\n 02 00 00 00 00 00 00 00 00 db 7d c1 00 00 00 c0 ..........}.....\n backtrace:\n [\u003c000000009e8643cb\u003e] add_res_tree+0xd0/0x270 [mlx5_core]\n [\u003c00000000e7cb8e6c\u003e] mlx5_debug_cq_add+0x5c/0xc0 [mlx5_core]\n [\u003c000000002a12918f\u003e] mlx5_core_create_cq+0x1d0/0x2d0 [mlx5_core]\n [\u003c00000000cef0a696\u003e] mlx5e_create_cq+0x210/0x3f0 [mlx5_core]\n [\u003c000000009c642c26\u003e] mlx5e_open_cq+0xb4/0x130 [mlx5_core]\n [\u003c0000000058dfa578\u003e] mlx5e_ptp_open+0x7f4/0xe10 [mlx5_core]\n [\u003c0000000081839561\u003e] mlx5e_open_channels+0x9cc/0x13e0 [mlx5_core]\n [\u003c0000000009cf05d4\u003e] mlx5e_switch_priv_channels+0xa4/0x230\n[mlx5_core]\n [\u003c0000000042bbedd8\u003e] mlx5e_safe_switch_params+0x14c/0x300\n[mlx5_core]\n [\u003c0000000004bc9db8\u003e] set_pflag_tx_port_ts+0x9c/0x160 [mlx5_core]\n [\u003c00000000a0553443\u003e] mlx5e_set_priv_flags+0xd0/0x1b0 [mlx5_core]\n [\u003c00000000a8f3d84b\u003e] ethnl_set_privflags+0x234/0x2d0\n [\u003c00000000fd27f27c\u003e] genl_family_rcv_msg_doit+0x108/0x1d0\n [\u003c00000000f495e2bb\u003e] genl_family_rcv_msg+0xe4/0x1f0\n [\u003c00000000646c5c2c\u003e] genl_rcv_msg+0x78/0x120\n [\u003c00000000d53e384e\u003e] netlink_rcv_skb+0x74/0x1a0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47438",
"url": "https://www.suse.com/security/cve/CVE-2021-47438"
},
{
"category": "external",
"summary": "SUSE Bug 1225229 for CVE-2021-47438",
"url": "https://bugzilla.suse.com/1225229"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47438"
},
{
"cve": "CVE-2021-47445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47445"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix null pointer dereference on pointer edp\n\nThe initialization of pointer dev dereferences pointer edp before\nedp is null checked, so there is a potential null pointer deference\nissue. Fix this by only dereferencing edp after edp has been null\nchecked.\n\nAddresses-Coverity: (\"Dereference before null check\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47445",
"url": "https://www.suse.com/security/cve/CVE-2021-47445"
},
{
"category": "external",
"summary": "SUSE Bug 1225261 for CVE-2021-47445",
"url": "https://bugzilla.suse.com/1225261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47445"
},
{
"cve": "CVE-2021-47498",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47498"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm rq: don\u0027t queue request to blk-mq during DM suspend\n\nDM uses blk-mq\u0027s quiesce/unquiesce to stop/start device mapper queue.\n\nBut blk-mq\u0027s unquiesce may come from outside events, such as elevator\nswitch, updating nr_requests or others, and request may come during\nsuspend, so simply ask for blk-mq to requeue it.\n\nFixes one kernel panic issue when running updating nr_requests and\ndm-mpath suspend/resume stress test.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47498",
"url": "https://www.suse.com/security/cve/CVE-2021-47498"
},
{
"category": "external",
"summary": "SUSE Bug 1225357 for CVE-2021-47498",
"url": "https://bugzilla.suse.com/1225357"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47498"
},
{
"cve": "CVE-2021-47518",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47518"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done\n\nThe done() netlink callback nfc_genl_dump_ses_done() should check if\nreceived argument is non-NULL, because its allocation could fail earlier\nin dumpit() (nfc_genl_dump_ses()).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47518",
"url": "https://www.suse.com/security/cve/CVE-2021-47518"
},
{
"category": "external",
"summary": "SUSE Bug 1225372 for CVE-2021-47518",
"url": "https://bugzilla.suse.com/1225372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47518"
},
{
"cve": "CVE-2021-47520",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47520"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: pch_can: pch_can_rx_normal: fix use after free\n\nAfter calling netif_receive_skb(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is dereferenced\njust after the call netif_receive_skb(skb).\n\nReordering the lines solves the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47520",
"url": "https://www.suse.com/security/cve/CVE-2021-47520"
},
{
"category": "external",
"summary": "SUSE Bug 1225431 for CVE-2021-47520",
"url": "https://bugzilla.suse.com/1225431"
},
{
"category": "external",
"summary": "SUSE Bug 1227905 for CVE-2021-47520",
"url": "https://bugzilla.suse.com/1227905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2021-47520"
},
{
"cve": "CVE-2021-47544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47544"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47544",
"url": "https://www.suse.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "SUSE Bug 1225463 for CVE-2021-47544",
"url": "https://bugzilla.suse.com/1225463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47544"
},
{
"cve": "CVE-2021-47547",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47547"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tulip: de4x5: fix the problem that the array \u0027lp-\u003ephy[8]\u0027 may be out of bound\n\nIn line 5001, if all id in the array \u0027lp-\u003ephy[8]\u0027 is not 0, when the\n\u0027for\u0027 end, the \u0027k\u0027 is 8.\n\nAt this time, the array \u0027lp-\u003ephy[8]\u0027 may be out of bound.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47547",
"url": "https://www.suse.com/security/cve/CVE-2021-47547"
},
{
"category": "external",
"summary": "SUSE Bug 1225505 for CVE-2021-47547",
"url": "https://bugzilla.suse.com/1225505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47547"
},
{
"cve": "CVE-2021-47566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47566"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nproc/vmcore: fix clearing user buffer by properly using clear_user()\n\nTo clear a user buffer we cannot simply use memset, we have to use\nclear_user(). With a virtio-mem device that registers a vmcore_cb and\nhas some logically unplugged memory inside an added Linux memory block,\nI can easily trigger a BUG by copying the vmcore via \"cp\":\n\n systemd[1]: Starting Kdump Vmcore Save Service...\n kdump[420]: Kdump is using the default log level(3).\n kdump[453]: saving to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/\n kdump[458]: saving vmcore-dmesg.txt to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/\n kdump[465]: saving vmcore-dmesg.txt complete\n kdump[467]: saving vmcore\n BUG: unable to handle page fault for address: 00007f2374e01000\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0003) - permissions violation\n PGD 7a523067 P4D 7a523067 PUD 7a528067 PMD 7a525067 PTE 800000007048f867\n Oops: 0003 [#1] PREEMPT SMP NOPTI\n CPU: 0 PID: 468 Comm: cp Not tainted 5.15.0+ #6\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.14.0-27-g64f37cc530f1-prebuilt.qemu.org 04/01/2014\n RIP: 0010:read_from_oldmem.part.0.cold+0x1d/0x86\n Code: ff ff ff e8 05 ff fe ff e9 b9 e9 7f ff 48 89 de 48 c7 c7 38 3b 60 82 e8 f1 fe fe ff 83 fd 08 72 3c 49 8d 7d 08 4c 89 e9 89 e8 \u003c49\u003e c7 45 00 00 00 00 00 49 c7 44 05 f8 00 00 00 00 48 83 e7 f81\n RSP: 0018:ffffc9000073be08 EFLAGS: 00010212\n RAX: 0000000000001000 RBX: 00000000002fd000 RCX: 00007f2374e01000\n RDX: 0000000000000001 RSI: 00000000ffffdfff RDI: 00007f2374e01008\n RBP: 0000000000001000 R08: 0000000000000000 R09: ffffc9000073bc50\n R10: ffffc9000073bc48 R11: ffffffff829461a8 R12: 000000000000f000\n R13: 00007f2374e01000 R14: 0000000000000000 R15: ffff88807bd421e8\n FS: 00007f2374e12140(0000) GS:ffff88807f000000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f2374e01000 CR3: 000000007a4aa000 CR4: 0000000000350eb0\n Call Trace:\n read_vmcore+0x236/0x2c0\n proc_reg_read+0x55/0xa0\n vfs_read+0x95/0x190\n ksys_read+0x4f/0xc0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nSome x86-64 CPUs have a CPU feature called \"Supervisor Mode Access\nPrevention (SMAP)\", which is used to detect wrong access from the kernel\nto user buffers like this: SMAP triggers a permissions violation on\nwrong access. In the x86-64 variant of clear_user(), SMAP is properly\nhandled via clac()+stac().\n\nTo fix, properly use clear_user() when we\u0027re dealing with a user buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47566",
"url": "https://www.suse.com/security/cve/CVE-2021-47566"
},
{
"category": "external",
"summary": "SUSE Bug 1225514 for CVE-2021-47566",
"url": "https://bugzilla.suse.com/1225514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47566"
},
{
"cve": "CVE-2021-47571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47571"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()\n\nThe free_rtllib() function frees the \"dev\" pointer so there is use\nafter free on the next line. Re-arrange things to avoid that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47571",
"url": "https://www.suse.com/security/cve/CVE-2021-47571"
},
{
"category": "external",
"summary": "SUSE Bug 1225518 for CVE-2021-47571",
"url": "https://bugzilla.suse.com/1225518"
},
{
"category": "external",
"summary": "SUSE Bug 1227551 for CVE-2021-47571",
"url": "https://bugzilla.suse.com/1227551"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2021-47571"
},
{
"cve": "CVE-2021-47576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47576"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()\n\nIn resp_mode_select() sanity check the block descriptor len to avoid UAF.\n\nBUG: KASAN: use-after-free in resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509\nRead of size 1 at addr ffff888026670f50 by task scsicmd/15032\n\nCPU: 1 PID: 15032 Comm: scsicmd Not tainted 5.15.0-01d0625 #15\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:107\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:257\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:443\n __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:306\n resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509\n schedule_resp+0x4af/0x1a10 drivers/scsi/scsi_debug.c:5483\n scsi_debug_queuecommand+0x8c9/0x1e70 drivers/scsi/scsi_debug.c:7537\n scsi_queue_rq+0x16b4/0x2d10 drivers/scsi/scsi_lib.c:1521\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1640\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1762\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1839\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:63\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:837\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:775\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:941\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1166\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:52\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:50\n entry_SYSCALL_64_after_hwframe+0x44/0xae arch/x86/entry/entry_64.S:113",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47576",
"url": "https://www.suse.com/security/cve/CVE-2021-47576"
},
{
"category": "external",
"summary": "SUSE Bug 1226537 for CVE-2021-47576",
"url": "https://bugzilla.suse.com/1226537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "low"
}
],
"title": "CVE-2021-47576"
},
{
"cve": "CVE-2021-47587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47587"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: systemport: Add global locking for descriptor lifecycle\n\nThe descriptor list is a shared resource across all of the transmit queues, and\nthe locking mechanism used today only protects concurrency across a given\ntransmit queue between the transmit and reclaiming. This creates an opportunity\nfor the SYSTEMPORT hardware to work on corrupted descriptors if we have\nmultiple producers at once which is the case when using multiple transmit\nqueues.\n\nThis was particularly noticeable when using multiple flows/transmit queues and\nit showed up in interesting ways in that UDP packets would get a correct UDP\nheader checksum being calculated over an incorrect packet length. Similarly TCP\npackets would get an equally correct checksum computed by the hardware over an\nincorrect packet length.\n\nThe SYSTEMPORT hardware maintains an internal descriptor list that it re-arranges\nwhen the driver produces a new descriptor anytime it writes to the\nWRITE_PORT_{HI,LO} registers, there is however some delay in the hardware to\nre-organize its descriptors and it is possible that concurrent TX queues\neventually break this internal allocation scheme to the point where the\nlength/status part of the descriptor gets used for an incorrect data buffer.\n\nThe fix is to impose a global serialization for all TX queues in the short\nsection where we are writing to the WRITE_PORT_{HI,LO} registers which solves\nthe corruption even with multiple concurrent TX queues being used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47587",
"url": "https://www.suse.com/security/cve/CVE-2021-47587"
},
{
"category": "external",
"summary": "SUSE Bug 1226567 for CVE-2021-47587",
"url": "https://bugzilla.suse.com/1226567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47587"
},
{
"cve": "CVE-2021-47589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47589"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigbvf: fix double free in `igbvf_probe`\n\nIn `igbvf_probe`, if register_netdev() fails, the program will go to\nlabel err_hw_init, and then to label err_ioremap. In free_netdev() which\nis just below label err_ioremap, there is `list_for_each_entry_safe` and\n`netif_napi_del` which aims to delete all entries in `dev-\u003enapi_list`.\nThe program has added an entry `adapter-\u003erx_ring-\u003enapi` which is added by\n`netif_napi_add` in igbvf_alloc_queues(). However, adapter-\u003erx_ring has\nbeen freed below label err_hw_init. So this a UAF.\n\nIn terms of how to patch the problem, we can refer to igbvf_remove() and\ndelete the entry before `adapter-\u003erx_ring`.\n\nThe KASAN logs are as follows:\n\n[ 35.126075] BUG: KASAN: use-after-free in free_netdev+0x1fd/0x450\n[ 35.127170] Read of size 8 at addr ffff88810126d990 by task modprobe/366\n[ 35.128360]\n[ 35.128643] CPU: 1 PID: 366 Comm: modprobe Not tainted 5.15.0-rc2+ #14\n[ 35.129789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[ 35.131749] Call Trace:\n[ 35.132199] dump_stack_lvl+0x59/0x7b\n[ 35.132865] print_address_description+0x7c/0x3b0\n[ 35.133707] ? free_netdev+0x1fd/0x450\n[ 35.134378] __kasan_report+0x160/0x1c0\n[ 35.135063] ? free_netdev+0x1fd/0x450\n[ 35.135738] kasan_report+0x4b/0x70\n[ 35.136367] free_netdev+0x1fd/0x450\n[ 35.137006] igbvf_probe+0x121d/0x1a10 [igbvf]\n[ 35.137808] ? igbvf_vlan_rx_add_vid+0x100/0x100 [igbvf]\n[ 35.138751] local_pci_probe+0x13c/0x1f0\n[ 35.139461] pci_device_probe+0x37e/0x6c0\n[ 35.165526]\n[ 35.165806] Allocated by task 366:\n[ 35.166414] ____kasan_kmalloc+0xc4/0xf0\n[ 35.167117] foo_kmem_cache_alloc_trace+0x3c/0x50 [igbvf]\n[ 35.168078] igbvf_probe+0x9c5/0x1a10 [igbvf]\n[ 35.168866] local_pci_probe+0x13c/0x1f0\n[ 35.169565] pci_device_probe+0x37e/0x6c0\n[ 35.179713]\n[ 35.179993] Freed by task 366:\n[ 35.180539] kasan_set_track+0x4c/0x80\n[ 35.181211] kasan_set_free_info+0x1f/0x40\n[ 35.181942] ____kasan_slab_free+0x103/0x140\n[ 35.182703] kfree+0xe3/0x250\n[ 35.183239] igbvf_probe+0x1173/0x1a10 [igbvf]\n[ 35.184040] local_pci_probe+0x13c/0x1f0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47589",
"url": "https://www.suse.com/security/cve/CVE-2021-47589"
},
{
"category": "external",
"summary": "SUSE Bug 1226557 for CVE-2021-47589",
"url": "https://bugzilla.suse.com/1226557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47589"
},
{
"cve": "CVE-2021-47600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47600"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: fix use after free in rebalance_children()\n\nMove dm_tm_unlock() after dm_tm_dec().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47600",
"url": "https://www.suse.com/security/cve/CVE-2021-47600"
},
{
"category": "external",
"summary": "SUSE Bug 1226575 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "external",
"summary": "SUSE Bug 1227472 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1227472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47600"
},
{
"cve": "CVE-2021-47602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: track only QoS data frames for admission control\n\nFor admission control, obviously all of that only works for\nQoS data frames, otherwise we cannot even access the QoS\nfield in the header.\n\nSyzbot reported (see below) an uninitialized value here due\nto a status of a non-QoS nullfunc packet, which isn\u0027t even\nlong enough to contain the QoS header.\n\nFix this to only do anything for QoS data packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47602",
"url": "https://www.suse.com/security/cve/CVE-2021-47602"
},
{
"category": "external",
"summary": "SUSE Bug 1226554 for CVE-2021-47602",
"url": "https://bugzilla.suse.com/1226554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47602"
},
{
"cve": "CVE-2021-47603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47603"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naudit: improve robustness of the audit queue handling\n\nIf the audit daemon were ever to get stuck in a stopped state the\nkernel\u0027s kauditd_thread() could get blocked attempting to send audit\nrecords to the userspace audit daemon. With the kernel thread\nblocked it is possible that the audit queue could grow unbounded as\ncertain audit record generating events must be exempt from the queue\nlimits else the system enter a deadlock state.\n\nThis patch resolves this problem by lowering the kernel thread\u0027s\nsocket sending timeout from MAX_SCHEDULE_TIMEOUT to HZ/10 and tweaks\nthe kauditd_send_queue() function to better manage the various audit\nqueues when connection problems occur between the kernel and the\naudit daemon. With this patch, the backlog may temporarily grow\nbeyond the defined limits when the audit daemon is stopped and the\nsystem is under heavy audit pressure, but kauditd_thread() will\ncontinue to make progress and drain the queues as it would for other\nconnection problems. For example, with the audit daemon put into a\nstopped state and the system configured to audit every syscall it\nwas still possible to shutdown the system without a kernel panic,\ndeadlock, etc.; granted, the system was slow to shutdown but that is\nto be expected given the extreme pressure of recording every syscall.\n\nThe timeout value of HZ/10 was chosen primarily through\nexperimentation and this developer\u0027s \"gut feeling\". There is likely\nno one perfect value, but as this scenario is limited in scope (root\nprivileges would be needed to send SIGSTOP to the audit daemon), it\nis likely not worth exposing this as a tunable at present. This can\nalways be done at a later date if it proves necessary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47603",
"url": "https://www.suse.com/security/cve/CVE-2021-47603"
},
{
"category": "external",
"summary": "SUSE Bug 1226577 for CVE-2021-47603",
"url": "https://bugzilla.suse.com/1226577"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47603"
},
{
"cve": "CVE-2021-47609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47609"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Fix string overflow in SCPI genpd driver\n\nWithout the bound checks for scpi_pd-\u003ename, it could result in the buffer\noverflow when copying the SCPI device name from the corresponding device\ntree node as the name string is set at maximum size of 30.\n\nLet us fix it by using devm_kasprintf so that the string buffer is\nallocated dynamically.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47609",
"url": "https://www.suse.com/security/cve/CVE-2021-47609"
},
{
"category": "external",
"summary": "SUSE Bug 1226562 for CVE-2021-47609",
"url": "https://bugzilla.suse.com/1226562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47609"
},
{
"cve": "CVE-2021-47617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47617"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: pciehp: Fix infinite loop in IRQ handler upon power fault\n\nThe Power Fault Detected bit in the Slot Status register differs from\nall other hotplug events in that it is sticky: It can only be cleared\nafter turning off slot power. Per PCIe r5.0, sec. 6.7.1.8:\n\n If a power controller detects a main power fault on the hot-plug slot,\n it must automatically set its internal main power fault latch [...].\n The main power fault latch is cleared when software turns off power to\n the hot-plug slot.\n\nThe stickiness used to cause interrupt storms and infinite loops which\nwere fixed in 2009 by commits 5651c48cfafe (\"PCI pciehp: fix power fault\ninterrupt storm problem\") and 99f0169c17f3 (\"PCI: pciehp: enable\nsoftware notification on empty slots\").\n\nUnfortunately in 2020 the infinite loop issue was inadvertently\nreintroduced by commit 8edf5332c393 (\"PCI: pciehp: Fix MSI interrupt\nrace\"): The hardirq handler pciehp_isr() clears the PFD bit until\npciehp\u0027s power_fault_detected flag is set. That happens in the IRQ\nthread pciehp_ist(), which never learns of the event because the hardirq\nhandler is stuck in an infinite loop. Fix by setting the\npower_fault_detected flag already in the hardirq handler.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47617",
"url": "https://www.suse.com/security/cve/CVE-2021-47617"
},
{
"category": "external",
"summary": "SUSE Bug 1226614 for CVE-2021-47617",
"url": "https://bugzilla.suse.com/1226614"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2021-47617"
},
{
"cve": "CVE-2022-0435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0435"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0435",
"url": "https://www.suse.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "SUSE Bug 1195254 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1195254"
},
{
"category": "external",
"summary": "SUSE Bug 1195308 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1195308"
},
{
"category": "external",
"summary": "SUSE Bug 1226672 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1226672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2022-0435"
},
{
"cve": "CVE-2022-22942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22942"
}
],
"notes": [
{
"category": "general",
"text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22942",
"url": "https://www.suse.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "SUSE Bug 1195065 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "external",
"summary": "SUSE Bug 1195951 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-48711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48711"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: improve size validations for received domain records\n\nThe function tipc_mon_rcv() allows a node to receive and process\ndomain_record structs from peer nodes to track their views of the\nnetwork topology.\n\nThis patch verifies that the number of members in a received domain\nrecord does not exceed the limit defined by MAX_MON_DOMAIN, something\nthat may otherwise lead to a stack overflow.\n\ntipc_mon_rcv() is called from the function tipc_link_proto_rcv(), where\nwe are reading a 32 bit message data length field into a uint16. To\navert any risk of bit overflow, we add an extra sanity check for this in\nthat function. We cannot see that happen with the current code, but\nfuture designers being unaware of this risk, may introduce it by\nallowing delivery of very large (\u003e 64k) sk buffers from the bearer\nlayer. This potential problem was identified by Eric Dumazet.\n\nThis fixes CVE-2022-0435",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48711",
"url": "https://www.suse.com/security/cve/CVE-2022-48711"
},
{
"category": "external",
"summary": "SUSE Bug 1226672 for CVE-2022-48711",
"url": "https://bugzilla.suse.com/1226672"
},
{
"category": "external",
"summary": "SUSE Bug 1227473 for CVE-2022-48711",
"url": "https://bugzilla.suse.com/1227473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48711"
},
{
"cve": "CVE-2022-48715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48715"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Make bnx2fc_recv_frame() mp safe\n\nRunning tests with a debug kernel shows that bnx2fc_recv_frame() is\nmodifying the per_cpu lport stats counters in a non-mpsafe way. Just boot\na debug kernel and run the bnx2fc driver with the hardware enabled.\n\n[ 1391.699147] BUG: using smp_processor_id() in preemptible [00000000] code: bnx2fc_\n[ 1391.699160] caller is bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]\n[ 1391.699174] CPU: 2 PID: 4355 Comm: bnx2fc_l2_threa Kdump: loaded Tainted: G B\n[ 1391.699180] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013\n[ 1391.699183] Call Trace:\n[ 1391.699188] dump_stack_lvl+0x57/0x7d\n[ 1391.699198] check_preemption_disabled+0xc8/0xd0\n[ 1391.699205] bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]\n[ 1391.699215] ? do_raw_spin_trylock+0xb5/0x180\n[ 1391.699221] ? bnx2fc_npiv_create_vports.isra.0+0x4e0/0x4e0 [bnx2fc]\n[ 1391.699229] ? bnx2fc_l2_rcv_thread+0xb7/0x3a0 [bnx2fc]\n[ 1391.699240] bnx2fc_l2_rcv_thread+0x1af/0x3a0 [bnx2fc]\n[ 1391.699250] ? bnx2fc_ulp_init+0xc0/0xc0 [bnx2fc]\n[ 1391.699258] kthread+0x364/0x420\n[ 1391.699263] ? _raw_spin_unlock_irq+0x24/0x50\n[ 1391.699268] ? set_kthread_struct+0x100/0x100\n[ 1391.699273] ret_from_fork+0x22/0x30\n\nRestore the old get_cpu/put_cpu code with some modifications to reduce the\nsize of the critical section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48715",
"url": "https://www.suse.com/security/cve/CVE-2022-48715"
},
{
"category": "external",
"summary": "SUSE Bug 1226621 for CVE-2022-48715",
"url": "https://bugzilla.suse.com/1226621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "low"
}
],
"title": "CVE-2022-48715"
},
{
"cve": "CVE-2022-48722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ieee802154: ca8210: Stop leaking skb\u0027s\n\nUpon error the ieee802154_xmit_complete() helper is not called. Only\nieee802154_wake_queue() is called manually. We then leak the skb\nstructure.\n\nFree the skb structure upon error before returning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48722",
"url": "https://www.suse.com/security/cve/CVE-2022-48722"
},
{
"category": "external",
"summary": "SUSE Bug 1226619 for CVE-2022-48722",
"url": "https://bugzilla.suse.com/1226619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48722"
},
{
"cve": "CVE-2022-48732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48732"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: fix off by one in BIOS boundary checking\n\nBounds checking when parsing init scripts embedded in the BIOS reject\naccess to the last byte. This causes driver initialization to fail on\nApple eMac\u0027s with GeForce 2 MX GPUs, leaving the system with no working\nconsole.\n\nThis is probably only seen on OpenFirmware machines like PowerPC Macs\nbecause the BIOS image provided by OF is only the used parts of the ROM,\nnot a power-of-two blocks read from PCI directly so PCs always have\nempty bytes at the end that are never accessed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48732",
"url": "https://www.suse.com/security/cve/CVE-2022-48732"
},
{
"category": "external",
"summary": "SUSE Bug 1226716 for CVE-2022-48732",
"url": "https://bugzilla.suse.com/1226716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48732"
},
{
"cve": "CVE-2022-48733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48733"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free after failure to create a snapshot\n\nAt ioctl.c:create_snapshot(), we allocate a pending snapshot structure and\nthen attach it to the transaction\u0027s list of pending snapshots. After that\nwe call btrfs_commit_transaction(), and if that returns an error we jump\nto \u0027fail\u0027 label, where we kfree() the pending snapshot structure. This can\nresult in a later use-after-free of the pending snapshot:\n\n1) We allocated the pending snapshot and added it to the transaction\u0027s\n list of pending snapshots;\n\n2) We call btrfs_commit_transaction(), and it fails either at the first\n call to btrfs_run_delayed_refs() or btrfs_start_dirty_block_groups().\n In both cases, we don\u0027t abort the transaction and we release our\n transaction handle. We jump to the \u0027fail\u0027 label and free the pending\n snapshot structure. We return with the pending snapshot still in the\n transaction\u0027s list;\n\n3) Another task commits the transaction. This time there\u0027s no error at\n all, and then during the transaction commit it accesses a pointer\n to the pending snapshot structure that the snapshot creation task\n has already freed, resulting in a user-after-free.\n\nThis issue could actually be detected by smatch, which produced the\nfollowing warning:\n\n fs/btrfs/ioctl.c:843 create_snapshot() warn: \u0027\u0026pending_snapshot-\u003elist\u0027 not removed from list\n\nSo fix this by not having the snapshot creation ioctl directly add the\npending snapshot to the transaction\u0027s list. Instead add the pending\nsnapshot to the transaction handle, and then at btrfs_commit_transaction()\nwe add the snapshot to the list only when we can guarantee that any error\nreturned after that point will result in a transaction abort, in which\ncase the ioctl code can safely free the pending snapshot and no one can\naccess it anymore.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48733",
"url": "https://www.suse.com/security/cve/CVE-2022-48733"
},
{
"category": "external",
"summary": "SUSE Bug 1226718 for CVE-2022-48733",
"url": "https://bugzilla.suse.com/1226718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48733"
},
{
"cve": "CVE-2022-48740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48740"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: fix double free of cond_list on error paths\n\nOn error path from cond_read_list() and duplicate_policydb_cond_list()\nthe cond_list_destroy() gets called a second time in caller functions,\nresulting in NULL pointer deref. Fix this by resetting the\ncond_list_len to 0 in cond_list_destroy(), making subsequent calls a\nnoop.\n\nAlso consistently reset the cond_list pointer to NULL after freeing.\n\n[PM: fix line lengths in the description]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48740",
"url": "https://www.suse.com/security/cve/CVE-2022-48740"
},
{
"category": "external",
"summary": "SUSE Bug 1226699 for CVE-2022-48740",
"url": "https://bugzilla.suse.com/1226699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48740"
},
{
"cve": "CVE-2022-48743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48743"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: amd-xgbe: Fix skb data length underflow\n\nThere will be BUG_ON() triggered in include/linux/skbuff.h leading to\nintermittent kernel panic, when the skb length underflow is detected.\n\nFix this by dropping the packet if such length underflows are seen\nbecause of inconsistencies in the hardware descriptors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48743",
"url": "https://www.suse.com/security/cve/CVE-2022-48743"
},
{
"category": "external",
"summary": "SUSE Bug 1226705 for CVE-2022-48743",
"url": "https://bugzilla.suse.com/1226705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48743"
},
{
"cve": "CVE-2022-48754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48754"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphylib: fix potential use-after-free\n\nCommit bafbdd527d56 (\"phylib: Add device reset GPIO support\") added call\nto phy_device_reset(phydev) after the put_device() call in phy_detach().\n\nThe comment before the put_device() call says that the phydev might go\naway with put_device().\n\nFix potential use-after-free by calling phy_device_reset() before\nput_device().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48754",
"url": "https://www.suse.com/security/cve/CVE-2022-48754"
},
{
"category": "external",
"summary": "SUSE Bug 1226692 for CVE-2022-48754",
"url": "https://bugzilla.suse.com/1226692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48754"
},
{
"cve": "CVE-2022-48756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48756"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dsi: invalid parameter check in msm_dsi_phy_enable\n\nThe function performs a check on the \"phy\" input parameter, however, it\nis used before the check.\n\nInitialize the \"dev\" variable after the sanity check to avoid a possible\nNULL pointer dereference.\n\nAddresses-Coverity-ID: 1493860 (\"Null pointer dereference\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48756",
"url": "https://www.suse.com/security/cve/CVE-2022-48756"
},
{
"category": "external",
"summary": "SUSE Bug 1226698 for CVE-2022-48756",
"url": "https://bugzilla.suse.com/1226698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48756"
},
{
"cve": "CVE-2022-48758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48758"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()\n\nThe bnx2fc_destroy() functions are removing the interface before calling\ndestroy_work. This results multiple WARNings from sysfs_remove_group() as\nthe controller rport device attributes are removed too early.\n\nReplace the fcoe_port\u0027s destroy_work queue. It\u0027s not needed.\n\nThe problem is easily reproducible with the following steps.\n\nExample:\n\n $ dmesg -w \u0026\n $ systemctl enable --now fcoe\n $ fipvlan -s -c ens2f1\n $ fcoeadm -d ens2f1.802\n [ 583.464488] host2: libfc: Link down on port (7500a1)\n [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!!\n [ 583.490468] ------------[ cut here ]------------\n [ 583.538725] sysfs group \u0027power\u0027 not found for kobject \u0027rport-2:0-0\u0027\n [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80\n [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ...\n [ 583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1\n [ 583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013\n [ 584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc]\n [ 584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80\n [ 584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ...\n [ 584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282\n [ 584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000\n [ 584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0\n [ 584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00\n [ 584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400\n [ 584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004\n [ 584.355379] FS: 0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000\n [ 584.394419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0\n [ 584.454888] Call Trace:\n [ 584.466108] device_del+0xb2/0x3e0\n [ 584.481701] device_unregister+0x13/0x60\n [ 584.501306] bsg_unregister_queue+0x5b/0x80\n [ 584.522029] bsg_remove_queue+0x1c/0x40\n [ 584.541884] fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc]\n [ 584.573823] process_one_work+0x1e3/0x3b0\n [ 584.592396] worker_thread+0x50/0x3b0\n [ 584.609256] ? rescuer_thread+0x370/0x370\n [ 584.628877] kthread+0x149/0x170\n [ 584.643673] ? set_kthread_struct+0x40/0x40\n [ 584.662909] ret_from_fork+0x22/0x30\n [ 584.680002] ---[ end trace 53575ecefa942ece ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48758",
"url": "https://www.suse.com/security/cve/CVE-2022-48758"
},
{
"category": "external",
"summary": "SUSE Bug 1226708 for CVE-2022-48758",
"url": "https://bugzilla.suse.com/1226708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48758"
},
{
"cve": "CVE-2022-48759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48759"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev\n\nstruct rpmsg_ctrldev contains a struct cdev. The current code frees\nthe rpmsg_ctrldev struct in rpmsg_ctrldev_release_device(), but the\ncdev is a managed object, therefore its release is not predictable\nand the rpmsg_ctrldev could be freed before the cdev is entirely\nreleased, as in the backtrace below.\n\n[ 93.625603] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x7c\n[ 93.636115] WARNING: CPU: 0 PID: 12 at lib/debugobjects.c:488 debug_print_object+0x13c/0x1b0\n[ 93.644799] Modules linked in: veth xt_cgroup xt_MASQUERADE rfcomm algif_hash algif_skcipher af_alg uinput ip6table_nat fuse uvcvideo videobuf2_vmalloc venus_enc venus_dec videobuf2_dma_contig hci_uart btandroid btqca snd_soc_rt5682_i2c bluetooth qcom_spmi_temp_alarm snd_soc_rt5682v\n[ 93.715175] CPU: 0 PID: 12 Comm: kworker/0:1 Tainted: G B 5.4.163-lockdep #26\n[ 93.723855] Hardware name: Google Lazor (rev3 - 8) with LTE (DT)\n[ 93.730055] Workqueue: events kobject_delayed_cleanup\n[ 93.735271] pstate: 60c00009 (nZCv daif +PAN +UAO)\n[ 93.740216] pc : debug_print_object+0x13c/0x1b0\n[ 93.744890] lr : debug_print_object+0x13c/0x1b0\n[ 93.749555] sp : ffffffacf5bc7940\n[ 93.752978] x29: ffffffacf5bc7940 x28: dfffffd000000000\n[ 93.758448] x27: ffffffacdb11a800 x26: dfffffd000000000\n[ 93.763916] x25: ffffffd0734f856c x24: dfffffd000000000\n[ 93.769389] x23: 0000000000000000 x22: ffffffd0733c35b0\n[ 93.774860] x21: ffffffd0751994a0 x20: ffffffd075ec27c0\n[ 93.780338] x19: ffffffd075199100 x18: 00000000000276e0\n[ 93.785814] x17: 0000000000000000 x16: dfffffd000000000\n[ 93.791291] x15: ffffffffffffffff x14: 6e6968207473696c\n[ 93.796768] x13: 0000000000000000 x12: ffffffd075e2b000\n[ 93.802244] x11: 0000000000000001 x10: 0000000000000000\n[ 93.807723] x9 : d13400dff1921900 x8 : d13400dff1921900\n[ 93.813200] x7 : 0000000000000000 x6 : 0000000000000000\n[ 93.818676] x5 : 0000000000000080 x4 : 0000000000000000\n[ 93.824152] x3 : ffffffd0732a0fa4 x2 : 0000000000000001\n[ 93.829628] x1 : ffffffacf5bc7580 x0 : 0000000000000061\n[ 93.835104] Call trace:\n[ 93.837644] debug_print_object+0x13c/0x1b0\n[ 93.841963] __debug_check_no_obj_freed+0x25c/0x3c0\n[ 93.846987] debug_check_no_obj_freed+0x18/0x20\n[ 93.851669] slab_free_freelist_hook+0xbc/0x1e4\n[ 93.856346] kfree+0xfc/0x2f4\n[ 93.859416] rpmsg_ctrldev_release_device+0x78/0xb8\n[ 93.864445] device_release+0x84/0x168\n[ 93.868310] kobject_cleanup+0x12c/0x298\n[ 93.872356] kobject_delayed_cleanup+0x10/0x18\n[ 93.876948] process_one_work+0x578/0x92c\n[ 93.881086] worker_thread+0x804/0xcf8\n[ 93.884963] kthread+0x2a8/0x314\n[ 93.888303] ret_from_fork+0x10/0x18\n\nThe cdev_device_add/del() API was created to address this issue (see\ncommit \u0027233ed09d7fda (\"chardev: add helper function to register char\ndevs with a struct device\")\u0027), use it instead of cdev add/del().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48759",
"url": "https://www.suse.com/security/cve/CVE-2022-48759"
},
{
"category": "external",
"summary": "SUSE Bug 1226711 for CVE-2022-48759",
"url": "https://bugzilla.suse.com/1226711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48759"
},
{
"cve": "CVE-2022-48760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48760"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix hang in usb_kill_urb by adding memory barriers\n\nThe syzbot fuzzer has identified a bug in which processes hang waiting\nfor usb_kill_urb() to return. It turns out the issue is not unlinking\nthe URB; that works just fine. Rather, the problem arises when the\nwakeup notification that the URB has completed is not received.\n\nThe reason is memory-access ordering on SMP systems. In outline form,\nusb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on\ndifferent CPUs perform the following actions:\n\nCPU 0\t\t\t\t\tCPU 1\n----------------------------\t\t---------------------------------\nusb_kill_urb():\t\t\t\t__usb_hcd_giveback_urb():\n ...\t\t\t\t\t ...\n atomic_inc(\u0026urb-\u003ereject);\t\t atomic_dec(\u0026urb-\u003euse_count);\n ...\t\t\t\t\t ...\n wait_event(usb_kill_urb_queue,\n\tatomic_read(\u0026urb-\u003euse_count) == 0);\n\t\t\t\t\t if (atomic_read(\u0026urb-\u003ereject))\n\t\t\t\t\t\twake_up(\u0026usb_kill_urb_queue);\n\nConfining your attention to urb-\u003ereject and urb-\u003euse_count, you can\nsee that the overall pattern of accesses on CPU 0 is:\n\n\twrite urb-\u003ereject, then read urb-\u003euse_count;\n\nwhereas the overall pattern of accesses on CPU 1 is:\n\n\twrite urb-\u003euse_count, then read urb-\u003ereject.\n\nThis pattern is referred to in memory-model circles as SB (for \"Store\nBuffering\"), and it is well known that without suitable enforcement of\nthe desired order of accesses -- in the form of memory barriers -- it\nis entirely possible for one or both CPUs to execute their reads ahead\nof their writes. The end result will be that sometimes CPU 0 sees the\nold un-decremented value of urb-\u003euse_count while CPU 1 sees the old\nun-incremented value of urb-\u003ereject. Consequently CPU 0 ends up on\nthe wait queue and never gets woken up, leading to the observed hang\nin usb_kill_urb().\n\nThe same pattern of accesses occurs in usb_poison_urb() and the\nfailure pathway of usb_hcd_submit_urb().\n\nThe problem is fixed by adding suitable memory barriers. To provide\nproper memory-access ordering in the SB pattern, a full barrier is\nrequired on both CPUs. The atomic_inc() and atomic_dec() accesses\nthemselves don\u0027t provide any memory ordering, but since they are\npresent, we can use the optimized smp_mb__after_atomic() memory\nbarrier in the various routines to obtain the desired effect.\n\nThis patch adds the necessary memory barriers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48760",
"url": "https://www.suse.com/security/cve/CVE-2022-48760"
},
{
"category": "external",
"summary": "SUSE Bug 1226712 for CVE-2022-48760",
"url": "https://bugzilla.suse.com/1226712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48760"
},
{
"cve": "CVE-2022-48761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48761"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci-plat: fix crash when suspend if remote wake enable\n\nCrashed at i.mx8qm platform when suspend if enable remote wakeup\n\nInternal error: synchronous external abort: 96000210 [#1] PREEMPT SMP\nModules linked in:\nCPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12\nHardware name: Freescale i.MX8QM MEK (DT)\nWorkqueue: events_unbound async_run_entry_fn\npstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : xhci_disable_hub_port_wake.isra.62+0x60/0xf8\nlr : xhci_disable_hub_port_wake.isra.62+0x34/0xf8\nsp : ffff80001394bbf0\nx29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578\nx26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000\nx23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001\nx20: 0000000000000000 x19: ffff800014e90490 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0\nx8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453\nx5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff00081193a29c\nx2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff000814591620\nCall trace:\n xhci_disable_hub_port_wake.isra.62+0x60/0xf8\n xhci_suspend+0x58/0x510\n xhci_plat_suspend+0x50/0x78\n platform_pm_suspend+0x2c/0x78\n dpm_run_callback.isra.25+0x50/0xe8\n __device_suspend+0x108/0x3c0\n\nThe basic flow:\n\t1. run time suspend call xhci_suspend, xhci parent devices gate the clock.\n 2. echo mem \u003e/sys/power/state, system _device_suspend call xhci_suspend\n 3. xhci_suspend call xhci_disable_hub_port_wake, which access register,\n\t but clock already gated by run time suspend.\n\nThis problem was hidden by power domain driver, which call run time resume before it.\n\nBut the below commit remove it and make this issue happen.\n\tcommit c1df456d0f06e (\"PM: domains: Don\u0027t runtime resume devices at genpd_prepare()\")\n\nThis patch call run time resume before suspend to make sure clock is on\nbefore access register.\n\nTesteb-by: Abel Vesa \u003cabel.vesa@nxp.com\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48761",
"url": "https://www.suse.com/security/cve/CVE-2022-48761"
},
{
"category": "external",
"summary": "SUSE Bug 1226701 for CVE-2022-48761",
"url": "https://bugzilla.suse.com/1226701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48761"
},
{
"cve": "CVE-2022-48771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48771"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix stale file descriptors on failed usercopy\n\nA failing usercopy of the fence_rep object will lead to a stale entry in\nthe file descriptor table as put_unused_fd() won\u0027t release it. This\nenables userland to refer to a dangling \u0027file\u0027 object through that still\nvalid file descriptor, leading to all kinds of use-after-free\nexploitation scenarios.\n\nFix this by deferring the call to fd_install() until after the usercopy\nhas succeeded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48771",
"url": "https://www.suse.com/security/cve/CVE-2022-48771"
},
{
"category": "external",
"summary": "SUSE Bug 1226732 for CVE-2022-48771",
"url": "https://bugzilla.suse.com/1226732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48771"
},
{
"cve": "CVE-2022-48772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48772"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: lgdt3306a: Add a check against null-pointer-def\n\nThe driver should check whether the client provides the platform_data.\n\nThe following log reveals it:\n\n[ 29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40\n[ 29.610730] Read of size 40 at addr 0000000000000000 by task bash/414\n[ 29.612820] Call Trace:\n[ 29.613030] \u003cTASK\u003e\n[ 29.613201] dump_stack_lvl+0x56/0x6f\n[ 29.613496] ? kmemdup+0x30/0x40\n[ 29.613754] print_report.cold+0x494/0x6b7\n[ 29.614082] ? kmemdup+0x30/0x40\n[ 29.614340] kasan_report+0x8a/0x190\n[ 29.614628] ? kmemdup+0x30/0x40\n[ 29.614888] kasan_check_range+0x14d/0x1d0\n[ 29.615213] memcpy+0x20/0x60\n[ 29.615454] kmemdup+0x30/0x40\n[ 29.615700] lgdt3306a_probe+0x52/0x310\n[ 29.616339] i2c_device_probe+0x951/0xa90",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48772",
"url": "https://www.suse.com/security/cve/CVE-2022-48772"
},
{
"category": "external",
"summary": "SUSE Bug 1226976 for CVE-2022-48772",
"url": "https://bugzilla.suse.com/1226976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2022-48772"
},
{
"cve": "CVE-2023-24023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-24023"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-24023",
"url": "https://www.suse.com/security/cve/CVE-2023-24023"
},
{
"category": "external",
"summary": "SUSE Bug 1218148 for CVE-2023-24023",
"url": "https://bugzilla.suse.com/1218148"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2023-4244",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4244"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability in the Linux kernel\u0027s netfilter: nf_tables component can be exploited to achieve local privilege escalation.\n\nDue to a race condition between nf_tables netlink control plane transaction and nft_set element garbage collection, it is possible to underflow the reference counter causing a use-after-free vulnerability.\n\nWe recommend upgrading past commit 3e91b0ebd994635df2346353322ac51ce84ce6d8.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4244",
"url": "https://www.suse.com/security/cve/CVE-2023-4244"
},
{
"category": "external",
"summary": "SUSE Bug 1215420 for CVE-2023-4244",
"url": "https://bugzilla.suse.com/1215420"
},
{
"category": "external",
"summary": "SUSE Bug 1215424 for CVE-2023-4244",
"url": "https://bugzilla.suse.com/1215424"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-4244"
},
{
"cve": "CVE-2023-52507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52507"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: assert requested protocol is valid\n\nThe protocol is used in a bit mask to determine if the protocol is\nsupported. Assert the provided protocol is less than the maximum\ndefined so it doesn\u0027t potentially perform a shift-out-of-bounds and\nprovide a clearer error for undefined protocols vs unsupported ones.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52507",
"url": "https://www.suse.com/security/cve/CVE-2023-52507"
},
{
"category": "external",
"summary": "SUSE Bug 1220833 for CVE-2023-52507",
"url": "https://bugzilla.suse.com/1220833"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52507"
},
{
"cve": "CVE-2023-52622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52622"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid online resizing failures due to oversized flex bg\n\nWhen we online resize an ext4 filesystem with a oversized flexbg_size,\n\n mkfs.ext4 -F -G 67108864 $dev -b 4096 100M\n mount $dev $dir\n resize2fs $dev 16G\n\nthe following WARN_ON is triggered:\n==================================================================\nWARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550\nModules linked in: sg(E)\nCPU: 0 PID: 427 Comm: resize2fs Tainted: G E 6.6.0-rc5+ #314\nRIP: 0010:__alloc_pages+0x411/0x550\nCall Trace:\n \u003cTASK\u003e\n __kmalloc_large_node+0xa2/0x200\n __kmalloc+0x16e/0x290\n ext4_resize_fs+0x481/0xd80\n __ext4_ioctl+0x1616/0x1d90\n ext4_ioctl+0x12/0x20\n __x64_sys_ioctl+0xf0/0x150\n do_syscall_64+0x3b/0x90\n==================================================================\n\nThis is because flexbg_size is too large and the size of the new_group_data\narray to be allocated exceeds MAX_ORDER. Currently, the minimum value of\nMAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding\nmaximum number of groups that can be allocated is:\n\n (PAGE_SIZE \u003c\u003c MAX_ORDER) / sizeof(struct ext4_new_group_data) ~ 21845\n\nAnd the value that is down-aligned to the power of 2 is 16384. Therefore,\nthis value is defined as MAX_RESIZE_BG, and the number of groups added\neach time does not exceed this value during resizing, and is added multiple\ntimes to complete the online resizing. The difference is that the metadata\nin a flex_bg may be more dispersed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52622",
"url": "https://www.suse.com/security/cve/CVE-2023-52622"
},
{
"category": "external",
"summary": "SUSE Bug 1222080 for CVE-2023-52622",
"url": "https://bugzilla.suse.com/1222080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52622"
},
{
"cve": "CVE-2023-52675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52675"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/imc-pmu: Add a null pointer check in update_events_in_group()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52675",
"url": "https://www.suse.com/security/cve/CVE-2023-52675"
},
{
"category": "external",
"summary": "SUSE Bug 1224504 for CVE-2023-52675",
"url": "https://bugzilla.suse.com/1224504"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52675"
},
{
"cve": "CVE-2023-52683",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52683"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: LPIT: Avoid u32 multiplication overflow\n\nIn lpit_update_residency() there is a possibility of overflow\nin multiplication, if tsc_khz is large enough (\u003e UINT_MAX/1000).\n\nChange multiplication to mul_u32_u32().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52683",
"url": "https://www.suse.com/security/cve/CVE-2023-52683"
},
{
"category": "external",
"summary": "SUSE Bug 1224627 for CVE-2023-52683",
"url": "https://bugzilla.suse.com/1224627"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52683"
},
{
"cve": "CVE-2023-52693",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52693"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: video: check for error while searching for backlight device parent\n\nIf acpi_get_parent() called in acpi_video_dev_register_backlight()\nfails, for example, because acpi_ut_acquire_mutex() fails inside\nacpi_get_parent), this can lead to incorrect (uninitialized)\nacpi_parent handle being passed to acpi_get_pci_dev() for detecting\nthe parent pci device.\n\nCheck acpi_get_parent() result and set parent device only in case of success.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52693",
"url": "https://www.suse.com/security/cve/CVE-2023-52693"
},
{
"category": "external",
"summary": "SUSE Bug 1224686 for CVE-2023-52693",
"url": "https://bugzilla.suse.com/1224686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52693"
},
{
"cve": "CVE-2023-52737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52737"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: lock the inode in shared mode before starting fiemap\n\nCurrently fiemap does not take the inode\u0027s lock (VFS lock), it only locks\na file range in the inode\u0027s io tree. This however can lead to a deadlock\nif we have a concurrent fsync on the file and fiemap code triggers a fault\nwhen accessing the user space buffer with fiemap_fill_next_extent(). The\ndeadlock happens on the inode\u0027s i_mmap_lock semaphore, which is taken both\nby fsync and btrfs_page_mkwrite(). This deadlock was recently reported by\nsyzbot and triggers a trace like the following:\n\n task:syz-executor361 state:D stack:20264 pid:5668 ppid:5119 flags:0x00004004\n Call Trace:\n \u003cTASK\u003e\n context_switch kernel/sched/core.c:5293 [inline]\n __schedule+0x995/0xe20 kernel/sched/core.c:6606\n schedule+0xcb/0x190 kernel/sched/core.c:6682\n wait_on_state fs/btrfs/extent-io-tree.c:707 [inline]\n wait_extent_bit+0x577/0x6f0 fs/btrfs/extent-io-tree.c:751\n lock_extent+0x1c2/0x280 fs/btrfs/extent-io-tree.c:1742\n find_lock_delalloc_range+0x4e6/0x9c0 fs/btrfs/extent_io.c:488\n writepage_delalloc+0x1ef/0x540 fs/btrfs/extent_io.c:1863\n __extent_writepage+0x736/0x14e0 fs/btrfs/extent_io.c:2174\n extent_write_cache_pages+0x983/0x1220 fs/btrfs/extent_io.c:3091\n extent_writepages+0x219/0x540 fs/btrfs/extent_io.c:3211\n do_writepages+0x3c3/0x680 mm/page-writeback.c:2581\n filemap_fdatawrite_wbc+0x11e/0x170 mm/filemap.c:388\n __filemap_fdatawrite_range mm/filemap.c:421 [inline]\n filemap_fdatawrite_range+0x175/0x200 mm/filemap.c:439\n btrfs_fdatawrite_range fs/btrfs/file.c:3850 [inline]\n start_ordered_ops fs/btrfs/file.c:1737 [inline]\n btrfs_sync_file+0x4ff/0x1190 fs/btrfs/file.c:1839\n generic_write_sync include/linux/fs.h:2885 [inline]\n btrfs_do_write_iter+0xcd3/0x1280 fs/btrfs/file.c:1684\n call_write_iter include/linux/fs.h:2189 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x7dc/0xc50 fs/read_write.c:584\n ksys_write+0x177/0x2a0 fs/read_write.c:637\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n RIP: 0033:0x7f7d4054e9b9\n RSP: 002b:00007f7d404fa2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n RAX: ffffffffffffffda RBX: 00007f7d405d87a0 RCX: 00007f7d4054e9b9\n RDX: 0000000000000090 RSI: 0000000020000000 RDI: 0000000000000006\n RBP: 00007f7d405a51d0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 61635f65646f6e69\n R13: 65646f7475616f6e R14: 7261637369646f6e R15: 00007f7d405d87a8\n \u003c/TASK\u003e\n INFO: task syz-executor361:5697 blocked for more than 145 seconds.\n Not tainted 6.2.0-rc3-syzkaller-00376-g7c6984405241 #0\n \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:syz-executor361 state:D stack:21216 pid:5697 ppid:5119 flags:0x00004004\n Call Trace:\n \u003cTASK\u003e\n context_switch kernel/sched/core.c:5293 [inline]\n __schedule+0x995/0xe20 kernel/sched/core.c:6606\n schedule+0xcb/0x190 kernel/sched/core.c:6682\n rwsem_down_read_slowpath+0x5f9/0x930 kernel/locking/rwsem.c:1095\n __down_read_common+0x54/0x2a0 kernel/locking/rwsem.c:1260\n btrfs_page_mkwrite+0x417/0xc80 fs/btrfs/inode.c:8526\n do_page_mkwrite+0x19e/0x5e0 mm/memory.c:2947\n wp_page_shared+0x15e/0x380 mm/memory.c:3295\n handle_pte_fault mm/memory.c:4949 [inline]\n __handle_mm_fault mm/memory.c:5073 [inline]\n handle_mm_fault+0x1b79/0x26b0 mm/memory.c:5219\n do_user_addr_fault+0x69b/0xcb0 arch/x86/mm/fault.c:1428\n handle_page_fault arch/x86/mm/fault.c:1519 [inline]\n exc_page_fault+0x7a/0x110 arch/x86/mm/fault.c:1575\n asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570\n RIP: 0010:copy_user_short_string+0xd/0x40 arch/x86/lib/copy_user_64.S:233\n Code: 74 0a 89 (...)\n RSP: 0018:ffffc9000570f330 EFLAGS: 000502\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52737",
"url": "https://www.suse.com/security/cve/CVE-2023-52737"
},
{
"category": "external",
"summary": "SUSE Bug 1225484 for CVE-2023-52737",
"url": "https://bugzilla.suse.com/1225484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52737"
},
{
"cve": "CVE-2023-52752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free bug in cifs_debug_data_proc_show()\n\nSkip SMB sessions that are being teared down\n(e.g. @ses-\u003eses_status == SES_EXITING) in cifs_debug_data_proc_show()\nto avoid use-after-free in @ses.\n\nThis fixes the following GPF when reading from /proc/fs/cifs/DebugData\nwhile mounting and umounting\n\n [ 816.251274] general protection fault, probably for non-canonical\n address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI\n ...\n [ 816.260138] Call Trace:\n [ 816.260329] \u003cTASK\u003e\n [ 816.260499] ? die_addr+0x36/0x90\n [ 816.260762] ? exc_general_protection+0x1b3/0x410\n [ 816.261126] ? asm_exc_general_protection+0x26/0x30\n [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs]\n [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs]\n [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs]\n [ 816.262689] ? seq_read_iter+0x379/0x470\n [ 816.262995] seq_read_iter+0x118/0x470\n [ 816.263291] proc_reg_read_iter+0x53/0x90\n [ 816.263596] ? srso_alias_return_thunk+0x5/0x7f\n [ 816.263945] vfs_read+0x201/0x350\n [ 816.264211] ksys_read+0x75/0x100\n [ 816.264472] do_syscall_64+0x3f/0x90\n [ 816.264750] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n [ 816.265135] RIP: 0033:0x7fd5e669d381",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52752",
"url": "https://www.suse.com/security/cve/CVE-2023-52752"
},
{
"category": "external",
"summary": "SUSE Bug 1225487 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "external",
"summary": "SUSE Bug 1225819 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2023-52752"
},
{
"cve": "CVE-2023-52753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52753"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Avoid NULL dereference of timing generator\n\n[Why \u0026 How]\nCheck whether assigned timing generator is NULL or not before\naccessing its funcs to prevent NULL dereference.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52753",
"url": "https://www.suse.com/security/cve/CVE-2023-52753"
},
{
"category": "external",
"summary": "SUSE Bug 1225478 for CVE-2023-52753",
"url": "https://bugzilla.suse.com/1225478"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52753"
},
{
"cve": "CVE-2023-52754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52754"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imon: fix access to invalid resource for the second interface\n\nimon driver probes two USB interfaces, and at the probe of the second\ninterface, the driver assumes blindly that the first interface got\nbound with the same imon driver. It\u0027s usually true, but it\u0027s still\npossible that the first interface is bound with another driver via a\nmalformed descriptor. Then it may lead to a memory corruption, as\nspotted by syzkaller; imon driver accesses the data from drvdata as\nstruct imon_context object although it\u0027s a completely different one\nthat was assigned by another driver.\n\nThis patch adds a sanity check -- whether the first interface is\nreally bound with the imon driver or not -- for avoiding the problem\nabove at the probe time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52754",
"url": "https://www.suse.com/security/cve/CVE-2023-52754"
},
{
"category": "external",
"summary": "SUSE Bug 1225490 for CVE-2023-52754",
"url": "https://bugzilla.suse.com/1225490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52754"
},
{
"cve": "CVE-2023-52757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52757"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential deadlock when releasing mids\n\nAll release_mid() callers seem to hold a reference of @mid so there is\nno need to call kref_put(\u0026mid-\u003erefcount, __release_mid) under\n@server-\u003emid_lock spinlock. If they don\u0027t, then an use-after-free bug\nwould have occurred anyways.\n\nBy getting rid of such spinlock also fixes a potential deadlock as\nshown below\n\nCPU 0 CPU 1\n------------------------------------------------------------------\ncifs_demultiplex_thread() cifs_debug_data_proc_show()\n release_mid()\n spin_lock(\u0026server-\u003emid_lock);\n spin_lock(\u0026cifs_tcp_ses_lock)\n\t\t\t\t spin_lock(\u0026server-\u003emid_lock)\n __release_mid()\n smb2_find_smb_tcon()\n spin_lock(\u0026cifs_tcp_ses_lock) *deadlock*",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52757",
"url": "https://www.suse.com/security/cve/CVE-2023-52757"
},
{
"category": "external",
"summary": "SUSE Bug 1225548 for CVE-2023-52757",
"url": "https://bugzilla.suse.com/1225548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52757"
},
{
"cve": "CVE-2023-52762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52762"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: fix implicit overflow on virtio_max_dma_size\n\nThe following codes have an implicit conversion from size_t to u32:\n(u32)max_size = (size_t)virtio_max_dma_size(vdev);\n\nThis may lead overflow, Ex (size_t)4G -\u003e (u32)0. Once\nvirtio_max_dma_size() has a larger size than U32_MAX, use U32_MAX\ninstead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52762",
"url": "https://www.suse.com/security/cve/CVE-2023-52762"
},
{
"category": "external",
"summary": "SUSE Bug 1225573 for CVE-2023-52762",
"url": "https://bugzilla.suse.com/1225573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52762"
},
{
"cve": "CVE-2023-52764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52764"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: gspca: cpia1: shift-out-of-bounds in set_flicker\n\nSyzkaller reported the following issue:\nUBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27\nshift exponent 245 is too large for 32-bit type \u0027int\u0027\n\nWhen the value of the variable \"sd-\u003eparams.exposure.gain\" exceeds the\nnumber of bits in an integer, a shift-out-of-bounds error is reported. It\nis triggered because the variable \"currentexp\" cannot be left-shifted by\nmore than the number of bits in an integer. In order to avoid invalid\nrange during left-shift, the conditional expression is added.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52764",
"url": "https://www.suse.com/security/cve/CVE-2023-52764"
},
{
"category": "external",
"summary": "SUSE Bug 1225571 for CVE-2023-52764",
"url": "https://bugzilla.suse.com/1225571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52764"
},
{
"cve": "CVE-2023-52784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52784"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: stop the device in bond_setup_by_slave()\n\nCommit 9eed321cde22 (\"net: lapbether: only support ethernet devices\")\nhas been able to keep syzbot away from net/lapb, until today.\n\nIn the following splat [1], the issue is that a lapbether device has\nbeen created on a bonding device without members. Then adding a non\nARPHRD_ETHER member forced the bonding master to change its type.\n\nThe fix is to make sure we call dev_close() in bond_setup_by_slave()\nso that the potential linked lapbether devices (or any other devices\nhaving assumptions on the physical device) are removed.\n\nA similar bug has been addressed in commit 40baec225765\n(\"bonding: fix panic on non-ARPHRD_ETHER enslave failure\")\n\n[1]\nskbuff: skb_under_panic: text:ffff800089508810 len:44 put:40 head:ffff0000c78e7c00 data:ffff0000c78e7bea tail:0x16 end:0x140 dev:bond0\nkernel BUG at net/core/skbuff.c:192 !\nInternal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\nModules linked in:\nCPU: 0 PID: 6007 Comm: syz-executor383 Not tainted 6.6.0-rc3-syzkaller-gbf6547d8715b #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : skb_panic net/core/skbuff.c:188 [inline]\npc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nlr : skb_panic net/core/skbuff.c:188 [inline]\nlr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nsp : ffff800096a06aa0\nx29: ffff800096a06ab0 x28: ffff800096a06ba0 x27: dfff800000000000\nx26: ffff0000ce9b9b50 x25: 0000000000000016 x24: ffff0000c78e7bea\nx23: ffff0000c78e7c00 x22: 000000000000002c x21: 0000000000000140\nx20: 0000000000000028 x19: ffff800089508810 x18: ffff800096a06100\nx17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001\nx14: 1fffe00036837a32 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000201 x10: 0000000000000000 x9 : cb50b496c519aa00\nx8 : cb50b496c519aa00 x7 : 0000000000000001 x6 : 0000000000000001\nx5 : ffff800096a063b8 x4 : ffff80008e280f80 x3 : ffff8000805ad11c\nx2 : 0000000000000001 x1 : 0000000100000201 x0 : 0000000000000086\nCall trace:\nskb_panic net/core/skbuff.c:188 [inline]\nskb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nskb_push+0xf0/0x108 net/core/skbuff.c:2446\nip6gre_header+0xbc/0x738 net/ipv6/ip6_gre.c:1384\ndev_hard_header include/linux/netdevice.h:3136 [inline]\nlapbeth_data_transmit+0x1c4/0x298 drivers/net/wan/lapbether.c:257\nlapb_data_transmit+0x8c/0xb0 net/lapb/lapb_iface.c:447\nlapb_transmit_buffer+0x178/0x204 net/lapb/lapb_out.c:149\nlapb_send_control+0x220/0x320 net/lapb/lapb_subr.c:251\n__lapb_disconnect_request+0x9c/0x17c net/lapb/lapb_iface.c:326\nlapb_device_event+0x288/0x4e0 net/lapb/lapb_iface.c:492\nnotifier_call_chain+0x1a4/0x510 kernel/notifier.c:93\nraw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461\ncall_netdevice_notifiers_info net/core/dev.c:1970 [inline]\ncall_netdevice_notifiers_extack net/core/dev.c:2008 [inline]\ncall_netdevice_notifiers net/core/dev.c:2022 [inline]\n__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508\ndev_close_many+0x1e0/0x470 net/core/dev.c:1559\ndev_close+0x174/0x250 net/core/dev.c:1585\nlapbeth_device_event+0x2e4/0x958 drivers/net/wan/lapbether.c:466\nnotifier_call_chain+0x1a4/0x510 kernel/notifier.c:93\nraw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461\ncall_netdevice_notifiers_info net/core/dev.c:1970 [inline]\ncall_netdevice_notifiers_extack net/core/dev.c:2008 [inline]\ncall_netdevice_notifiers net/core/dev.c:2022 [inline]\n__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508\ndev_close_many+0x1e0/0x470 net/core/dev.c:1559\ndev_close+0x174/0x250 net/core/dev.c:1585\nbond_enslave+0x2298/0x30cc drivers/net/bonding/bond_main.c:2332\nbond_do_ioctl+0x268/0xc64 drivers/net/bonding/bond_main.c:4539\ndev_ifsioc+0x754/0x9ac\ndev_ioctl+0x4d8/0xd34 net/core/dev_ioctl.c:786\nsock_do_ioctl+0x1d4/0x2d0 net/socket.c:1217\nsock_ioctl+0x4e8/0x834 net/socket.c:1322\nvfs_ioctl fs/ioctl.c:51 [inline]\n__do_\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52784",
"url": "https://www.suse.com/security/cve/CVE-2023-52784"
},
{
"category": "external",
"summary": "SUSE Bug 1224946 for CVE-2023-52784",
"url": "https://bugzilla.suse.com/1224946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52784"
},
{
"cve": "CVE-2023-52808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52808"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs\n\nIf init debugfs failed during device registration due to memory allocation\nfailure, debugfs_remove_recursive() is called, after which debugfs_dir is\nnot set to NULL. debugfs_remove_recursive() will be called again during\ndevice removal. As a result, illegal pointer is accessed.\n\n[ 1665.467244] hisi_sas_v3_hw 0000:b4:02.0: failed to init debugfs!\n...\n[ 1669.836708] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0\n[ 1669.872669] pc : down_write+0x24/0x70\n[ 1669.876315] lr : down_write+0x1c/0x70\n[ 1669.879961] sp : ffff000036f53a30\n[ 1669.883260] x29: ffff000036f53a30 x28: ffffa027c31549f8\n[ 1669.888547] x27: ffffa027c3140000 x26: 0000000000000000\n[ 1669.893834] x25: ffffa027bf37c270 x24: ffffa027bf37c270\n[ 1669.899122] x23: ffff0000095406b8 x22: ffff0000095406a8\n[ 1669.904408] x21: 0000000000000000 x20: ffffa027bf37c310\n[ 1669.909695] x19: 00000000000000a0 x18: ffff8027dcd86f10\n[ 1669.914982] x17: 0000000000000000 x16: 0000000000000000\n[ 1669.920268] x15: 0000000000000000 x14: ffffa0274014f870\n[ 1669.925555] x13: 0000000000000040 x12: 0000000000000228\n[ 1669.930842] x11: 0000000000000020 x10: 0000000000000bb0\n[ 1669.936129] x9 : ffff000036f537f0 x8 : ffff80273088ca10\n[ 1669.941416] x7 : 000000000000001d x6 : 00000000ffffffff\n[ 1669.946702] x5 : ffff000008a36310 x4 : ffff80273088be00\n[ 1669.951989] x3 : ffff000009513e90 x2 : 0000000000000000\n[ 1669.957276] x1 : 00000000000000a0 x0 : ffffffff00000001\n[ 1669.962563] Call trace:\n[ 1669.965000] down_write+0x24/0x70\n[ 1669.968301] debugfs_remove_recursive+0x5c/0x1b0\n[ 1669.972905] hisi_sas_debugfs_exit+0x24/0x30 [hisi_sas_main]\n[ 1669.978541] hisi_sas_v3_remove+0x130/0x150 [hisi_sas_v3_hw]\n[ 1669.984175] pci_device_remove+0x48/0xd8\n[ 1669.988082] device_release_driver_internal+0x1b4/0x250\n[ 1669.993282] device_release_driver+0x28/0x38\n[ 1669.997534] pci_stop_bus_device+0x84/0xb8\n[ 1670.001611] pci_stop_and_remove_bus_device_locked+0x24/0x40\n[ 1670.007244] remove_store+0xfc/0x140\n[ 1670.010802] dev_attr_store+0x44/0x60\n[ 1670.014448] sysfs_kf_write+0x58/0x80\n[ 1670.018095] kernfs_fop_write+0xe8/0x1f0\n[ 1670.022000] __vfs_write+0x60/0x190\n[ 1670.025472] vfs_write+0xac/0x1c0\n[ 1670.028771] ksys_write+0x6c/0xd8\n[ 1670.032071] __arm64_sys_write+0x24/0x30\n[ 1670.035977] el0_svc_common+0x78/0x130\n[ 1670.039710] el0_svc_handler+0x38/0x78\n[ 1670.043442] el0_svc+0x8/0xc\n\nTo fix this, set debugfs_dir to NULL after debugfs_remove_recursive().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52808",
"url": "https://www.suse.com/security/cve/CVE-2023-52808"
},
{
"category": "external",
"summary": "SUSE Bug 1225555 for CVE-2023-52808",
"url": "https://bugzilla.suse.com/1225555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52808"
},
{
"cve": "CVE-2023-52809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52809"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()\n\nfc_lport_ptp_setup() did not check the return value of fc_rport_create()\nwhich can return NULL and would cause a NULL pointer dereference. Address\nthis issue by checking return value of fc_rport_create() and log error\nmessage on fc_rport_create() failed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52809",
"url": "https://www.suse.com/security/cve/CVE-2023-52809"
},
{
"category": "external",
"summary": "SUSE Bug 1225556 for CVE-2023-52809",
"url": "https://bugzilla.suse.com/1225556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52809"
},
{
"cve": "CVE-2023-52811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52811"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ibmvfc: Remove BUG_ON in the case of an empty event pool\n\nIn practice the driver should never send more commands than are allocated\nto a queue\u0027s event pool. In the unlikely event that this happens, the code\nasserts a BUG_ON, and in the case that the kernel is not configured to\ncrash on panic returns a junk event pointer from the empty event list\ncausing things to spiral from there. This BUG_ON is a historical artifact\nof the ibmvfc driver first being upstreamed, and it is well known now that\nthe use of BUG_ON is bad practice except in the most unrecoverable\nscenario. There is nothing about this scenario that prevents the driver\nfrom recovering and carrying on.\n\nRemove the BUG_ON in question from ibmvfc_get_event() and return a NULL\npointer in the case of an empty event pool. Update all call sites to\nibmvfc_get_event() to check for a NULL pointer and perfrom the appropriate\nfailure or recovery action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52811",
"url": "https://www.suse.com/security/cve/CVE-2023-52811"
},
{
"category": "external",
"summary": "SUSE Bug 1225559 for CVE-2023-52811",
"url": "https://bugzilla.suse.com/1225559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52811"
},
{
"cve": "CVE-2023-52817",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52817"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL\n\nIn certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:\n\n1. Navigate to the directory: /sys/kernel/debug/dri/0\n2. Execute command: cat amdgpu_regs_smc\n3. Exception Log::\n[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000\n[4005007.702562] #PF: supervisor instruction fetch in kernel mode\n[4005007.702567] #PF: error_code(0x0010) - not-present page\n[4005007.702570] PGD 0 P4D 0\n[4005007.702576] Oops: 0010 [#1] SMP NOPTI\n[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G OE 5.15.0-43-generic #46-Ubunt u\n[4005007.702590] RIP: 0010:0x0\n[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.\n[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206\n[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68\n[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000\n[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980\n[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000\n[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000\n[4005007.702622] FS: 00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000\n[4005007.702626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0\n[4005007.702633] Call Trace:\n[4005007.702636] \u003cTASK\u003e\n[4005007.702640] amdgpu_debugfs_regs_smc_read+0xb0/0x120 [amdgpu]\n[4005007.703002] full_proxy_read+0x5c/0x80\n[4005007.703011] vfs_read+0x9f/0x1a0\n[4005007.703019] ksys_read+0x67/0xe0\n[4005007.703023] __x64_sys_read+0x19/0x20\n[4005007.703028] do_syscall_64+0x5c/0xc0\n[4005007.703034] ? do_user_addr_fault+0x1e3/0x670\n[4005007.703040] ? exit_to_user_mode_prepare+0x37/0xb0\n[4005007.703047] ? irqentry_exit_to_user_mode+0x9/0x20\n[4005007.703052] ? irqentry_exit+0x19/0x30\n[4005007.703057] ? exc_page_fault+0x89/0x160\n[4005007.703062] ? asm_exc_page_fault+0x8/0x30\n[4005007.703068] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[4005007.703075] RIP: 0033:0x7f5e07672992\n[4005007.703079] Code: c0 e9 b2 fe ff ff 50 48 8d 3d fa b2 0c 00 e8 c5 1d 02 00 0f 1f 44 00 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 56 c3 0f 1f 44 00 00 48 83 e c 28 48 89 54 24\n[4005007.703083] RSP: 002b:00007ffe03097898 EFLAGS: 00000246 ORIG_RAX: 0000000000000000\n[4005007.703088] RAX: ffffffffffffffda RBX: 0000000000020000 RCX: 00007f5e07672992\n[4005007.703091] RDX: 0000000000020000 RSI: 00007f5e06753000 RDI: 0000000000000003\n[4005007.703094] RBP: 00007f5e06753000 R08: 00007f5e06752010 R09: 00007f5e06752010\n[4005007.703096] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000022000\n[4005007.703099] R13: 0000000000000003 R14: 0000000000020000 R15: 0000000000020000\n[4005007.703105] \u003c/TASK\u003e\n[4005007.703107] Modules linked in: nf_tables libcrc32c nfnetlink algif_hash af_alg binfmt_misc nls_ iso8859_1 ipmi_ssif ast intel_rapl_msr intel_rapl_common drm_vram_helper drm_ttm_helper amd64_edac t tm edac_mce_amd kvm_amd ccp mac_hid k10temp kvm acpi_ipmi ipmi_si rapl sch_fq_codel ipmi_devintf ipm i_msghandler msr parport_pc ppdev lp parport mtd pstore_blk efi_pstore ramoops pstore_zone reed_solo mon ip_tables x_tables autofs4 ib_uverbs ib_core amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) iommu_v 2 amd_sched(OE) amdkcl(OE) drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core drm igb ahci xhci_pci libahci i2c_piix4 i2c_algo_bit xhci_pci_renesas dca\n[4005007.703184] CR2: 0000000000000000\n[4005007.703188] ---[ en\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52817",
"url": "https://www.suse.com/security/cve/CVE-2023-52817"
},
{
"category": "external",
"summary": "SUSE Bug 1225569 for CVE-2023-52817",
"url": "https://bugzilla.suse.com/1225569"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52817"
},
{
"cve": "CVE-2023-52818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52818"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd: Fix UBSAN array-index-out-of-bounds for SMU7\n\nFor pptable structs that use flexible array sizes, use flexible arrays.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52818",
"url": "https://www.suse.com/security/cve/CVE-2023-52818"
},
{
"category": "external",
"summary": "SUSE Bug 1225530 for CVE-2023-52818",
"url": "https://bugzilla.suse.com/1225530"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52818"
},
{
"cve": "CVE-2023-52819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga\n\nFor pptable structs that use flexible array sizes, use flexible arrays.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52819",
"url": "https://www.suse.com/security/cve/CVE-2023-52819"
},
{
"category": "external",
"summary": "SUSE Bug 1225532 for CVE-2023-52819",
"url": "https://bugzilla.suse.com/1225532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52819"
},
{
"cve": "CVE-2023-52832",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52832"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don\u0027t return unset power in ieee80211_get_tx_power()\n\nWe can get a UBSAN warning if ieee80211_get_tx_power() returns the\nINT_MIN value mac80211 internally uses for \"unset power level\".\n\n UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5\n -2147483648 * 100 cannot be represented in type \u0027int\u0027\n CPU: 0 PID: 20433 Comm: insmod Tainted: G WC OE\n Call Trace:\n dump_stack+0x74/0x92\n ubsan_epilogue+0x9/0x50\n handle_overflow+0x8d/0xd0\n __ubsan_handle_mul_overflow+0xe/0x10\n nl80211_send_iface+0x688/0x6b0 [cfg80211]\n [...]\n cfg80211_register_wdev+0x78/0xb0 [cfg80211]\n cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]\n [...]\n ieee80211_if_add+0x60e/0x8f0 [mac80211]\n ieee80211_register_hw+0xda5/0x1170 [mac80211]\n\nIn this case, simply return an error instead, to indicate\nthat no data is available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52832",
"url": "https://www.suse.com/security/cve/CVE-2023-52832"
},
{
"category": "external",
"summary": "SUSE Bug 1225577 for CVE-2023-52832",
"url": "https://bugzilla.suse.com/1225577"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52832"
},
{
"cve": "CVE-2023-52834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52834"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\natl1c: Work around the DMA RX overflow issue\n\nThis is based on alx driver commit 881d0327db37 (\"net: alx: Work around\nthe DMA RX overflow issue\").\n\nThe alx and atl1c drivers had RX overflow error which was why a custom\nallocator was created to avoid certain addresses. The simpler workaround\nthen created for alx driver, but not for atl1c due to lack of tester.\n\nInstead of using a custom allocator, check the allocated skb address and\nuse skb_reserve() to move away from problematic 0x...fc0 address.\n\nTested on AR8131 on Acer 4540.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52834",
"url": "https://www.suse.com/security/cve/CVE-2023-52834"
},
{
"category": "external",
"summary": "SUSE Bug 1225599 for CVE-2023-52834",
"url": "https://bugzilla.suse.com/1225599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52834"
},
{
"cve": "CVE-2023-52835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52835"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Bail out early if the request AUX area is out of bound\n\nWhen perf-record with a large AUX area, e.g 4GB, it fails with:\n\n #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n failed to mmap with 12 (Cannot allocate memory)\n\nand it reveals a WARNING with __alloc_pages():\n\n\t------------[ cut here ]------------\n\tWARNING: CPU: 44 PID: 17573 at mm/page_alloc.c:5568 __alloc_pages+0x1ec/0x248\n\tCall trace:\n\t __alloc_pages+0x1ec/0x248\n\t __kmalloc_large_node+0xc0/0x1f8\n\t __kmalloc_node+0x134/0x1e8\n\t rb_alloc_aux+0xe0/0x298\n\t perf_mmap+0x440/0x660\n\t mmap_region+0x308/0x8a8\n\t do_mmap+0x3c0/0x528\n\t vm_mmap_pgoff+0xf4/0x1b8\n\t ksys_mmap_pgoff+0x18c/0x218\n\t __arm64_sys_mmap+0x38/0x58\n\t invoke_syscall+0x50/0x128\n\t el0_svc_common.constprop.0+0x58/0x188\n\t do_el0_svc+0x34/0x50\n\t el0_svc+0x34/0x108\n\t el0t_64_sync_handler+0xb8/0xc0\n\t el0t_64_sync+0x1a4/0x1a8\n\n\u0027rb-\u003eaux_pages\u0027 allocated by kcalloc() is a pointer array which is used to\nmaintains AUX trace pages. The allocated page for this array is physically\ncontiguous (and virtually contiguous) with an order of 0..MAX_ORDER. If the\nsize of pointer array crosses the limitation set by MAX_ORDER, it reveals a\nWARNING.\n\nSo bail out early with -ENOMEM if the request AUX area is out of bound,\ne.g.:\n\n #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n failed to mmap with 12 (Cannot allocate memory)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52835",
"url": "https://www.suse.com/security/cve/CVE-2023-52835"
},
{
"category": "external",
"summary": "SUSE Bug 1225602 for CVE-2023-52835",
"url": "https://bugzilla.suse.com/1225602"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "low"
}
],
"title": "CVE-2023-52835"
},
{
"cve": "CVE-2023-52843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52843"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: verify mac len before reading mac header\n\nLLC reads the mac header with eth_hdr without verifying that the skb\nhas an Ethernet header.\n\nSyzbot was able to enter llc_rcv on a tun device. Tun can insert\npackets without mac len and with user configurable skb-\u003eprotocol\n(passing a tun_pi header when not configuring IFF_NO_PI).\n\n BUG: KMSAN: uninit-value in llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]\n BUG: KMSAN: uninit-value in llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111\n llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]\n llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111\n llc_rcv+0xc5d/0x14a0 net/llc/llc_input.c:218\n __netif_receive_skb_one_core net/core/dev.c:5523 [inline]\n __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637\n netif_receive_skb_internal net/core/dev.c:5723 [inline]\n netif_receive_skb+0x58/0x660 net/core/dev.c:5782\n tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555\n tun_get_user+0x54c5/0x69c0 drivers/net/tun.c:2002\n\nAdd a mac_len test before all three eth_hdr(skb) calls under net/llc.\n\nThere are further uses in include/net/llc_pdu.h. All these are\nprotected by a test skb-\u003eprotocol == ETH_P_802_2. Which does not\nprotect against this tun scenario.\n\nBut the mac_len test added in this patch in llc_fixup_skb will\nindirectly protect those too. That is called from llc_rcv before any\nother LLC code.\n\nIt is tempting to just add a blanket mac_len check in llc_rcv, but\nnot sure whether that could break valid LLC paths that do not assume\nan Ethernet header. 802.2 LLC may be used on top of non-802.3\nprotocols in principle. The below referenced commit shows that used\nto, on top of Token Ring.\n\nAt least one of the three eth_hdr uses goes back to before the start\nof git history. But the one that syzbot exercises is introduced in\nthis commit. That commit is old enough (2008), that effectively all\nstable kernels should receive this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52843",
"url": "https://www.suse.com/security/cve/CVE-2023-52843"
},
{
"category": "external",
"summary": "SUSE Bug 1224951 for CVE-2023-52843",
"url": "https://bugzilla.suse.com/1224951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52843"
},
{
"cve": "CVE-2023-52845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52845"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Change nla_policy for bearer-related names to NLA_NUL_STRING\n\nsyzbot reported the following uninit-value access issue [1]:\n\n=====================================================\nBUG: KMSAN: uninit-value in strlen lib/string.c:418 [inline]\nBUG: KMSAN: uninit-value in strstr+0xb8/0x2f0 lib/string.c:756\n strlen lib/string.c:418 [inline]\n strstr+0xb8/0x2f0 lib/string.c:756\n tipc_nl_node_reset_link_stats+0x3ea/0xb50 net/tipc/node.c:2595\n genl_family_rcv_msg_doit net/netlink/genetlink.c:971 [inline]\n genl_family_rcv_msg net/netlink/genetlink.c:1051 [inline]\n genl_rcv_msg+0x11ec/0x1290 net/netlink/genetlink.c:1066\n netlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2545\n genl_rcv+0x40/0x60 net/netlink/genetlink.c:1075\n netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline]\n netlink_unicast+0xf47/0x1250 net/netlink/af_netlink.c:1368\n netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910\n sock_sendmsg_nosec net/socket.c:730 [inline]\n sock_sendmsg net/socket.c:753 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595\n __sys_sendmsg net/socket.c:2624 [inline]\n __do_sys_sendmsg net/socket.c:2633 [inline]\n __se_sys_sendmsg net/socket.c:2631 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was created at:\n slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767\n slab_alloc_node mm/slub.c:3478 [inline]\n kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559\n __alloc_skb+0x318/0x740 net/core/skbuff.c:650\n alloc_skb include/linux/skbuff.h:1286 [inline]\n netlink_alloc_large_skb net/netlink/af_netlink.c:1214 [inline]\n netlink_sendmsg+0xb34/0x13d0 net/netlink/af_netlink.c:1885\n sock_sendmsg_nosec net/socket.c:730 [inline]\n sock_sendmsg net/socket.c:753 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595\n __sys_sendmsg net/socket.c:2624 [inline]\n __do_sys_sendmsg net/socket.c:2633 [inline]\n __se_sys_sendmsg net/socket.c:2631 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nTIPC bearer-related names including link names must be null-terminated\nstrings. If a link name which is not null-terminated is passed through\nnetlink, strstr() and similar functions can cause buffer overrun. This\ncauses the above issue.\n\nThis patch changes the nla_policy for bearer-related names from NLA_STRING\nto NLA_NUL_STRING. This resolves the issue by ensuring that only\nnull-terminated strings are accepted as bearer-related names.\n\nsyzbot reported similar uninit-value issue related to bearer names [2]. The\nroot cause of this issue is that a non-null-terminated bearer name was\npassed. This patch also resolved this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52845",
"url": "https://www.suse.com/security/cve/CVE-2023-52845"
},
{
"category": "external",
"summary": "SUSE Bug 1225585 for CVE-2023-52845",
"url": "https://bugzilla.suse.com/1225585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52845"
},
{
"cve": "CVE-2023-52855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52855"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: fix possible NULL pointer dereference caused by driver concurrency\n\nIn _dwc2_hcd_urb_enqueue(), \"urb-\u003ehcpriv = NULL\" is executed without\nholding the lock \"hsotg-\u003elock\". In _dwc2_hcd_urb_dequeue():\n\n spin_lock_irqsave(\u0026hsotg-\u003elock, flags);\n ...\n\tif (!urb-\u003ehcpriv) {\n\t\tdev_dbg(hsotg-\u003edev, \"## urb-\u003ehcpriv is NULL ##\\n\");\n\t\tgoto out;\n\t}\n rc = dwc2_hcd_urb_dequeue(hsotg, urb-\u003ehcpriv); // Use urb-\u003ehcpriv\n ...\nout:\n spin_unlock_irqrestore(\u0026hsotg-\u003elock, flags);\n\nWhen _dwc2_hcd_urb_enqueue() and _dwc2_hcd_urb_dequeue() are\nconcurrently executed, the NULL check of \"urb-\u003ehcpriv\" can be executed\nbefore \"urb-\u003ehcpriv = NULL\". After urb-\u003ehcpriv is NULL, it can be used\nin the function call to dwc2_hcd_urb_dequeue(), which can cause a NULL\npointer dereference.\n\nThis possible bug is found by an experimental static analysis tool\ndeveloped by myself. This tool analyzes the locking APIs to extract\nfunction pairs that can be concurrently executed, and then analyzes the\ninstructions in the paired functions to identify possible concurrency\nbugs including data races and atomicity violations. The above possible\nbug is reported, when my tool analyzes the source code of Linux 6.5.\n\nTo fix this possible bug, \"urb-\u003ehcpriv = NULL\" should be executed with\nholding the lock \"hsotg-\u003elock\". After using this patch, my tool never\nreports the possible bug, with the kernelconfiguration allyesconfig for\nx86_64. Because I have no associated hardware, I cannot test the patch\nin runtime testing, and just verify it according to the code logic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52855",
"url": "https://www.suse.com/security/cve/CVE-2023-52855"
},
{
"category": "external",
"summary": "SUSE Bug 1225583 for CVE-2023-52855",
"url": "https://bugzilla.suse.com/1225583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52855"
},
{
"cve": "CVE-2023-52881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52881"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: do not accept ACK of bytes we never sent\n\nThis patch is based on a detailed report and ideas from Yepeng Pan\nand Christian Rossow.\n\nACK seq validation is currently following RFC 5961 5.2 guidelines:\n\n The ACK value is considered acceptable only if\n it is in the range of ((SND.UNA - MAX.SND.WND) \u003c= SEG.ACK \u003c=\n SND.NXT). All incoming segments whose ACK value doesn\u0027t satisfy the\n above condition MUST be discarded and an ACK sent back. It needs to\n be noted that RFC 793 on page 72 (fifth check) says: \"If the ACK is a\n duplicate (SEG.ACK \u003c SND.UNA), it can be ignored. If the ACK\n acknowledges something not yet sent (SEG.ACK \u003e SND.NXT) then send an\n ACK, drop the segment, and return\". The \"ignored\" above implies that\n the processing of the incoming data segment continues, which means\n the ACK value is treated as acceptable. This mitigation makes the\n ACK check more stringent since any ACK \u003c SND.UNA wouldn\u0027t be\n accepted, instead only ACKs that are in the range ((SND.UNA -\n MAX.SND.WND) \u003c= SEG.ACK \u003c= SND.NXT) get through.\n\nThis can be refined for new (and possibly spoofed) flows,\nby not accepting ACK for bytes that were never sent.\n\nThis greatly improves TCP security at a little cost.\n\nI added a Fixes: tag to make sure this patch will reach stable trees,\neven if the \u0027blamed\u0027 patch was adhering to the RFC.\n\ntp-\u003ebytes_acked was added in linux-4.2\n\nFollowing packetdrill test (courtesy of Yepeng Pan) shows\nthe issue at hand:\n\n0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3\n+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0\n+0 bind(3, ..., ...) = 0\n+0 listen(3, 1024) = 0\n\n// ---------------- Handshake ------------------- //\n\n// when window scale is set to 14 the window size can be extended to\n// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet\n// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)\n// ,though this ack number acknowledges some data never\n// sent by the server.\n\n+0 \u003c S 0:0(0) win 65535 \u003cmss 1400,nop,wscale 14\u003e\n+0 \u003e S. 0:0(0) ack 1 \u003c...\u003e\n+0 \u003c . 1:1(0) ack 1 win 65535\n+0 accept(3, ..., ...) = 4\n\n// For the established connection, we send an ACK packet,\n// the ack packet uses ack number 1 - 1073725300 + 2^32,\n// where 2^32 is used to wrap around.\n// Note: we used 1073725300 instead of 1073725440 to avoid possible\n// edge cases.\n// 1 - 1073725300 + 2^32 = 3221241997\n\n// Oops, old kernels happily accept this packet.\n+0 \u003c . 1:1001(1000) ack 3221241997 win 65535\n\n// After the kernel fix the following will be replaced by a challenge ACK,\n// and prior malicious frame would be dropped.\n+0 \u003e . 1:1(0) ack 1001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52881",
"url": "https://www.suse.com/security/cve/CVE-2023-52881"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1225611 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "external",
"summary": "SUSE Bug 1226152 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1226152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2023-52881"
},
{
"cve": "CVE-2024-26633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26633"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()\n\nsyzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken.\n\nReading frag_off can only be done if we pulled enough bytes\nto skb-\u003ehead. Currently we might access garbage.\n\n[1]\nBUG: KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0\nip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0\nipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]\nip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432\n__netdev_start_xmit include/linux/netdevice.h:4940 [inline]\nnetdev_start_xmit include/linux/netdevice.h:4954 [inline]\nxmit_one net/core/dev.c:3548 [inline]\ndev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564\n__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\nneigh_connected_output+0x569/0x660 net/core/neighbour.c:1592\nneigh_output include/net/neighbour.h:542 [inline]\nip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137\nip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222\nNF_HOOK_COND include/linux/netfilter.h:303 [inline]\nip6_output+0x323/0x610 net/ipv6/ip6_output.c:243\ndst_output include/net/dst.h:451 [inline]\nip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155\nip6_send_skb net/ipv6/ip6_output.c:1952 [inline]\nip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972\nrawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582\nrawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920\ninet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg net/socket.c:745 [inline]\n____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n__sys_sendmsg net/socket.c:2667 [inline]\n__do_sys_sendmsg net/socket.c:2676 [inline]\n__se_sys_sendmsg net/socket.c:2674 [inline]\n__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\nslab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\nslab_alloc_node mm/slub.c:3478 [inline]\n__kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517\n__do_kmalloc_node mm/slab_common.c:1006 [inline]\n__kmalloc_node_track_caller+0x118/0x3c0 mm/slab_common.c:1027\nkmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582\npskb_expand_head+0x226/0x1a00 net/core/skbuff.c:2098\n__pskb_pull_tail+0x13b/0x2310 net/core/skbuff.c:2655\npskb_may_pull_reason include/linux/skbuff.h:2673 [inline]\npskb_may_pull include/linux/skbuff.h:2681 [inline]\nip6_tnl_parse_tlv_enc_lim+0x901/0xbb0 net/ipv6/ip6_tunnel.c:408\nipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]\nip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432\n__netdev_start_xmit include/linux/netdevice.h:4940 [inline]\nnetdev_start_xmit include/linux/netdevice.h:4954 [inline]\nxmit_one net/core/dev.c:3548 [inline]\ndev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564\n__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\nneigh_connected_output+0x569/0x660 net/core/neighbour.c:1592\nneigh_output include/net/neighbour.h:542 [inline]\nip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137\nip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222\nNF_HOOK_COND include/linux/netfilter.h:303 [inline]\nip6_output+0x323/0x610 net/ipv6/ip6_output.c:243\ndst_output include/net/dst.h:451 [inline]\nip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155\nip6_send_skb net/ipv6/ip6_output.c:1952 [inline]\nip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972\nrawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582\nrawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920\ninet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg net/socket.c:745 [inline]\n____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n__sys_sendmsg net/socket.c:2667 [inline]\n__do_sys_sendms\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26633",
"url": "https://www.suse.com/security/cve/CVE-2024-26633"
},
{
"category": "external",
"summary": "SUSE Bug 1221647 for CVE-2024-26633",
"url": "https://bugzilla.suse.com/1221647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26633"
},
{
"cve": "CVE-2024-26635",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26635"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: Drop support for ETH_P_TR_802_2.\n\nsyzbot reported an uninit-value bug below. [0]\n\nllc supports ETH_P_802_2 (0x0004) and used to support ETH_P_TR_802_2\n(0x0011), and syzbot abused the latter to trigger the bug.\n\n write$tun(r0, \u0026(0x7f0000000040)={@val={0x0, 0x11}, @val, @mpls={[], @llc={@snap={0xaa, 0x1, \u0027)\u0027, \"90e5dd\"}}}}, 0x16)\n\nllc_conn_handler() initialises local variables {saddr,daddr}.mac\nbased on skb in llc_pdu_decode_sa()/llc_pdu_decode_da() and passes\nthem to __llc_lookup().\n\nHowever, the initialisation is done only when skb-\u003eprotocol is\nhtons(ETH_P_802_2), otherwise, __llc_lookup_established() and\n__llc_lookup_listener() will read garbage.\n\nThe missing initialisation existed prior to commit 211ed865108e\n(\"net: delete all instances of special processing for token ring\").\n\nIt removed the part to kick out the token ring stuff but forgot to\nclose the door allowing ETH_P_TR_802_2 packets to sneak into llc_rcv().\n\nLet\u0027s remove llc_tr_packet_type and complete the deprecation.\n\n[0]:\nBUG: KMSAN: uninit-value in __llc_lookup_established+0xe9d/0xf90\n __llc_lookup_established+0xe9d/0xf90\n __llc_lookup net/llc/llc_conn.c:611 [inline]\n llc_conn_handler+0x4bd/0x1360 net/llc/llc_conn.c:791\n llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206\n __netif_receive_skb_one_core net/core/dev.c:5527 [inline]\n __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5641\n netif_receive_skb_internal net/core/dev.c:5727 [inline]\n netif_receive_skb+0x58/0x660 net/core/dev.c:5786\n tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555\n tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002\n tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n call_write_iter include/linux/fs.h:2020 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x8ef/0x1490 fs/read_write.c:584\n ksys_write+0x20f/0x4c0 fs/read_write.c:637\n __do_sys_write fs/read_write.c:649 [inline]\n __se_sys_write fs/read_write.c:646 [inline]\n __x64_sys_write+0x93/0xd0 fs/read_write.c:646\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nLocal variable daddr created at:\n llc_conn_handler+0x53/0x1360 net/llc/llc_conn.c:783\n llc_rcv+0xfbb/0x14a0 net/llc/llc_input.c:206\n\nCPU: 1 PID: 5004 Comm: syz-executor994 Not tainted 6.6.0-syzkaller-14500-g1c41041124bd #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/09/2023",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26635",
"url": "https://www.suse.com/security/cve/CVE-2024-26635"
},
{
"category": "external",
"summary": "SUSE Bug 1221656 for CVE-2024-26635",
"url": "https://bugzilla.suse.com/1221656"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26635"
},
{
"cve": "CVE-2024-26636",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26636"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: make llc_ui_sendmsg() more robust against bonding changes\n\nsyzbot was able to trick llc_ui_sendmsg(), allocating an skb with no\nheadroom, but subsequently trying to push 14 bytes of Ethernet header [1]\n\nLike some others, llc_ui_sendmsg() releases the socket lock before\ncalling sock_alloc_send_skb().\nThen it acquires it again, but does not redo all the sanity checks\nthat were performed.\n\nThis fix:\n\n- Uses LL_RESERVED_SPACE() to reserve space.\n- Check all conditions again after socket lock is held again.\n- Do not account Ethernet header for mtu limitation.\n\n[1]\n\nskbuff: skb_under_panic: text:ffff800088baa334 len:1514 put:14 head:ffff0000c9c37000 data:ffff0000c9c36ff2 tail:0x5dc end:0x6c0 dev:bond0\n\n kernel BUG at net/core/skbuff.c:193 !\nInternal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\nModules linked in:\nCPU: 0 PID: 6875 Comm: syz-executor.0 Not tainted 6.7.0-rc8-syzkaller-00101-g0802e17d9aca-dirty #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n pc : skb_panic net/core/skbuff.c:189 [inline]\n pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203\n lr : skb_panic net/core/skbuff.c:189 [inline]\n lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:203\nsp : ffff800096f97000\nx29: ffff800096f97010 x28: ffff80008cc8d668 x27: dfff800000000000\nx26: ffff0000cb970c90 x25: 00000000000005dc x24: ffff0000c9c36ff2\nx23: ffff0000c9c37000 x22: 00000000000005ea x21: 00000000000006c0\nx20: 000000000000000e x19: ffff800088baa334 x18: 1fffe000368261ce\nx17: ffff80008e4ed000 x16: ffff80008a8310f8 x15: 0000000000000001\nx14: 1ffff00012df2d58 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000001 x10: 0000000000ff0100 x9 : e28a51f1087e8400\nx8 : e28a51f1087e8400 x7 : ffff80008028f8d0 x6 : 0000000000000000\nx5 : 0000000000000001 x4 : 0000000000000001 x3 : ffff800082b78714\nx2 : 0000000000000001 x1 : 0000000100000000 x0 : 0000000000000089\nCall trace:\n skb_panic net/core/skbuff.c:189 [inline]\n skb_under_panic+0x13c/0x140 net/core/skbuff.c:203\n skb_push+0xf0/0x108 net/core/skbuff.c:2451\n eth_header+0x44/0x1f8 net/ethernet/eth.c:83\n dev_hard_header include/linux/netdevice.h:3188 [inline]\n llc_mac_hdr_init+0x110/0x17c net/llc/llc_output.c:33\n llc_sap_action_send_xid_c+0x170/0x344 net/llc/llc_s_ac.c:85\n llc_exec_sap_trans_actions net/llc/llc_sap.c:153 [inline]\n llc_sap_next_state net/llc/llc_sap.c:182 [inline]\n llc_sap_state_process+0x1ec/0x774 net/llc/llc_sap.c:209\n llc_build_and_send_xid_pkt+0x12c/0x1c0 net/llc/llc_sap.c:270\n llc_ui_sendmsg+0x7bc/0xb1c net/llc/af_llc.c:997\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n sock_sendmsg+0x194/0x274 net/socket.c:767\n splice_to_socket+0x7cc/0xd58 fs/splice.c:881\n do_splice_from fs/splice.c:933 [inline]\n direct_splice_actor+0xe4/0x1c0 fs/splice.c:1142\n splice_direct_to_actor+0x2a0/0x7e4 fs/splice.c:1088\n do_splice_direct+0x20c/0x348 fs/splice.c:1194\n do_sendfile+0x4bc/0xc70 fs/read_write.c:1254\n __do_sys_sendfile64 fs/read_write.c:1322 [inline]\n __se_sys_sendfile64 fs/read_write.c:1308 [inline]\n __arm64_sys_sendfile64+0x160/0x3b4 fs/read_write.c:1308\n __invoke_syscall arch/arm64/kernel/syscall.c:37 [inline]\n invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:51\n el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:136\n do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:155\n el0_svc+0x54/0x158 arch/arm64/kernel/entry-common.c:678\n el0t_64_sync_handler+0x84/0xfc arch/arm64/kernel/entry-common.c:696\n el0t_64_sync+0x190/0x194 arch/arm64/kernel/entry.S:595\nCode: aa1803e6 aa1903e7 a90023f5 94792f6a (d4210000)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26636",
"url": "https://www.suse.com/security/cve/CVE-2024-26636"
},
{
"category": "external",
"summary": "SUSE Bug 1221659 for CVE-2024-26636",
"url": "https://bugzilla.suse.com/1221659"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26636"
},
{
"cve": "CVE-2024-26641",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26641"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()\n\nsyzbot found __ip6_tnl_rcv() could access unitiliazed data [1].\n\nCall pskb_inet_may_pull() to fix this, and initialize ipv6h\nvariable after this call as it can change skb-\u003ehead.\n\n[1]\n BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321\n __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321\n ip6ip6_dscp_ecn_decapsulate+0x178/0x1b0 net/ipv6/ip6_tunnel.c:727\n __ip6_tnl_rcv+0xd4e/0x1590 net/ipv6/ip6_tunnel.c:845\n ip6_tnl_rcv+0xce/0x100 net/ipv6/ip6_tunnel.c:888\n gre_rcv+0x143f/0x1870\n ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438\n ip6_input_finish net/ipv6/ip6_input.c:483 [inline]\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492\n ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586\n dst_input include/net/dst.h:461 [inline]\n ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310\n __netif_receive_skb_one_core net/core/dev.c:5532 [inline]\n __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5646\n netif_receive_skb_internal net/core/dev.c:5732 [inline]\n netif_receive_skb+0x58/0x660 net/core/dev.c:5791\n tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555\n tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002\n tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n call_write_iter include/linux/fs.h:2084 [inline]\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x786/0x1200 fs/read_write.c:590\n ksys_write+0x20f/0x4c0 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x93/0xd0 fs/read_write.c:652\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560\n __alloc_skb+0x318/0x740 net/core/skbuff.c:651\n alloc_skb include/linux/skbuff.h:1286 [inline]\n alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334\n sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787\n tun_alloc_skb drivers/net/tun.c:1531 [inline]\n tun_get_user+0x1e8a/0x66d0 drivers/net/tun.c:1846\n tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n call_write_iter include/linux/fs.h:2084 [inline]\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x786/0x1200 fs/read_write.c:590\n ksys_write+0x20f/0x4c0 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x93/0xd0 fs/read_write.c:652\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nCPU: 0 PID: 5034 Comm: syz-executor331 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26641",
"url": "https://www.suse.com/security/cve/CVE-2024-26641"
},
{
"category": "external",
"summary": "SUSE Bug 1221654 for CVE-2024-26641",
"url": "https://bugzilla.suse.com/1221654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26641"
},
{
"cve": "CVE-2024-26679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26679"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: read sk-\u003esk_family once in inet_recv_error()\n\ninet_recv_error() is called without holding the socket lock.\n\nIPv6 socket could mutate to IPv4 with IPV6_ADDRFORM\nsocket option and trigger a KCSAN warning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26679",
"url": "https://www.suse.com/security/cve/CVE-2024-26679"
},
{
"category": "external",
"summary": "SUSE Bug 1222385 for CVE-2024-26679",
"url": "https://bugzilla.suse.com/1222385"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26679"
},
{
"cve": "CVE-2024-26687",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26687"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/events: close evtchn after mapping cleanup\n\nshutdown_pirq and startup_pirq are not taking the\nirq_mapping_update_lock because they can\u0027t due to lock inversion. Both\nare called with the irq_desc-\u003elock being taking. The lock order,\nhowever, is first irq_mapping_update_lock and then irq_desc-\u003elock.\n\nThis opens multiple races:\n- shutdown_pirq can be interrupted by a function that allocates an event\n channel:\n\n CPU0 CPU1\n shutdown_pirq {\n xen_evtchn_close(e)\n __startup_pirq {\n EVTCHNOP_bind_pirq\n -\u003e returns just freed evtchn e\n set_evtchn_to_irq(e, irq)\n }\n xen_irq_info_cleanup() {\n set_evtchn_to_irq(e, -1)\n }\n }\n\n Assume here event channel e refers here to the same event channel\n number.\n After this race the evtchn_to_irq mapping for e is invalid (-1).\n\n- __startup_pirq races with __unbind_from_irq in a similar way. Because\n __startup_pirq doesn\u0027t take irq_mapping_update_lock it can grab the\n evtchn that __unbind_from_irq is currently freeing and cleaning up. In\n this case even though the event channel is allocated, its mapping can\n be unset in evtchn_to_irq.\n\nThe fix is to first cleanup the mappings and then close the event\nchannel. In this way, when an event channel gets allocated it\u0027s\npotential previous evtchn_to_irq mappings are guaranteed to be unset already.\nThis is also the reverse order of the allocation where first the event\nchannel is allocated and then the mappings are setup.\n\nOn a 5.10 kernel prior to commit 3fcdaf3d7634 (\"xen/events: modify internal\n[un]bind interfaces\"), we hit a BUG like the following during probing of NVMe\ndevices. The issue is that during nvme_setup_io_queues, pci_free_irq\nis called for every device which results in a call to shutdown_pirq.\nWith many nvme devices it\u0027s therefore likely to hit this race during\nboot because there will be multiple calls to shutdown_pirq and\nstartup_pirq are running potentially in parallel.\n\n ------------[ cut here ]------------\n blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled\n kernel BUG at drivers/xen/events/events_base.c:499!\n invalid opcode: 0000 [#1] SMP PTI\n CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1\n Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006\n Workqueue: nvme-reset-wq nvme_reset_work\n RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0\n Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff \u003c0f\u003e 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00\n RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046\n RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006\n RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff\n RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00\n R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed\n R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002\n FS: 0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? show_trace_log_lvl+0x1c1/0x2d9\n ? show_trace_log_lvl+0x1c1/0x2d9\n ? set_affinity_irq+0xdc/0x1c0\n ? __die_body.cold+0x8/0xd\n ? die+0x2b/0x50\n ? do_trap+0x90/0x110\n ? bind_evtchn_to_cpu+0xdf/0xf0\n ? do_error_trap+0x65/0x80\n ? bind_evtchn_to_cpu+0xdf/0xf0\n ? exc_invalid_op+0x4e/0x70\n ? bind_evtchn_to_cpu+0xdf/0xf0\n ? asm_exc_invalid_op+0x12/0x20\n ? bind_evtchn_to_cpu+0xdf/0x\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26687",
"url": "https://www.suse.com/security/cve/CVE-2024-26687"
},
{
"category": "external",
"summary": "SUSE Bug 1222435 for CVE-2024-26687",
"url": "https://bugzilla.suse.com/1222435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26687"
},
{
"cve": "CVE-2024-26720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26720"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26720",
"url": "https://www.suse.com/security/cve/CVE-2024-26720"
},
{
"category": "external",
"summary": "SUSE Bug 1222364 for CVE-2024-26720",
"url": "https://bugzilla.suse.com/1222364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26720"
},
{
"cve": "CVE-2024-26813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/platform: Create persistent IRQ handlers\n\nThe vfio-platform SET_IRQS ioctl currently allows loopback triggering of\nan interrupt before a signaling eventfd has been configured by the user,\nwhich thereby allows a NULL pointer dereference.\n\nRather than register the IRQ relative to a valid trigger, register all\nIRQs in a disabled state in the device open path. This allows mask\noperations on the IRQ to nest within the overall enable state governed\nby a valid eventfd signal. This decouples @masked, protected by the\n@locked spinlock from @trigger, protected via the @igate mutex.\n\nIn doing so, it\u0027s guaranteed that changes to @trigger cannot race the\nIRQ handlers because the IRQ handler is synchronously disabled before\nmodifying the trigger, and loopback triggering of the IRQ via ioctl is\nsafe due to serialization with trigger changes via igate.\n\nFor compatibility, request_irq() failures are maintained to be local to\nthe SET_IRQS ioctl rather than a fatal error in the open device path.\nThis allows, for example, a userspace driver with polling mode support\nto continue to work regardless of moving the request_irq() call site.\nThis necessarily blocks all SET_IRQS access to the failed index.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26813",
"url": "https://www.suse.com/security/cve/CVE-2024-26813"
},
{
"category": "external",
"summary": "SUSE Bug 1222809 for CVE-2024-26813",
"url": "https://bugzilla.suse.com/1222809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26813"
},
{
"cve": "CVE-2024-26845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26845"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: core: Add TMF to tmr_list handling\n\nAn abort that is responded to by iSCSI itself is added to tmr_list but does\nnot go to target core. A LUN_RESET that goes through tmr_list takes a\nrefcounter on the abort and waits for completion. However, the abort will\nbe never complete because it was not started in target core.\n\n Unable to locate ITT: 0x05000000 on CID: 0\n Unable to locate RefTaskTag: 0x05000000 on CID: 0.\n wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop\n wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop\n...\n INFO: task kworker/0:2:49 blocked for more than 491 seconds.\n task:kworker/0:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00000800\n Workqueue: events target_tmr_work [target_core_mod]\nCall Trace:\n __switch_to+0x2c4/0x470\n _schedule+0x314/0x1730\n schedule+0x64/0x130\n schedule_timeout+0x168/0x430\n wait_for_completion+0x140/0x270\n target_put_cmd_and_wait+0x64/0xb0 [target_core_mod]\n core_tmr_lun_reset+0x30/0xa0 [target_core_mod]\n target_tmr_work+0xc8/0x1b0 [target_core_mod]\n process_one_work+0x2d4/0x5d0\n worker_thread+0x78/0x6c0\n\nTo fix this, only add abort to tmr_list if it will be handled by target\ncore.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26845",
"url": "https://www.suse.com/security/cve/CVE-2024-26845"
},
{
"category": "external",
"summary": "SUSE Bug 1223018 for CVE-2024-26845",
"url": "https://bugzilla.suse.com/1223018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26845"
},
{
"cve": "CVE-2024-26863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26863"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhsr: Fix uninit-value access in hsr_get_node()\n\nKMSAN reported the following uninit-value access issue [1]:\n\n=====================================================\nBUG: KMSAN: uninit-value in hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246\n hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246\n fill_frame_info net/hsr/hsr_forward.c:577 [inline]\n hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c:615\n hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223\n __netdev_start_xmit include/linux/netdevice.h:4940 [inline]\n netdev_start_xmit include/linux/netdevice.h:4954 [inline]\n xmit_one net/core/dev.c:3548 [inline]\n dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564\n __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349\n dev_queue_xmit include/linux/netdevice.h:3134 [inline]\n packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276\n packet_snd net/packet/af_packet.c:3087 [inline]\n packet_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n __sys_sendto+0x735/0xa10 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560\n __alloc_skb+0x318/0x740 net/core/skbuff.c:651\n alloc_skb include/linux/skbuff.h:1286 [inline]\n alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334\n sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787\n packet_alloc_skb net/packet/af_packet.c:2936 [inline]\n packet_snd net/packet/af_packet.c:3030 [inline]\n packet_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n __sys_sendto+0x735/0xa10 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nCPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\n=====================================================\n\nIf the packet type ID field in the Ethernet header is either ETH_P_PRP or\nETH_P_HSR, but it is not followed by an HSR tag, hsr_get_skb_sequence_nr()\nreads an invalid value as a sequence number. This causes the above issue.\n\nThis patch fixes the issue by returning NULL if the Ethernet header is not\nfollowed by an HSR tag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26863",
"url": "https://www.suse.com/security/cve/CVE-2024-26863"
},
{
"category": "external",
"summary": "SUSE Bug 1223021 for CVE-2024-26863",
"url": "https://bugzilla.suse.com/1223021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26863"
},
{
"cve": "CVE-2024-26880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26880"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: call the resume method on internal suspend\n\nThere is this reported crash when experimenting with the lvm2 testsuite.\nThe list corruption is caused by the fact that the postsuspend and resume\nmethods were not paired correctly; there were two consecutive calls to the\norigin_postsuspend function. The second call attempts to remove the\n\"hash_list\" entry from a list, while it was already removed by the first\ncall.\n\nFix __dm_internal_resume so that it calls the preresume and resume\nmethods of the table\u0027s targets.\n\nIf a preresume method of some target fails, we are in a tricky situation.\nWe can\u0027t return an error because dm_internal_resume isn\u0027t supposed to\nreturn errors. We can\u0027t return success, because then the \"resume\" and\n\"postsuspend\" methods would not be paired correctly. So, we set the\nDMF_SUSPENDED flag and we fake normal suspend - it may confuse userspace\ntools, but it won\u0027t cause a kernel crash.\n\n------------[ cut here ]------------\nkernel BUG at lib/list_debug.c:56!\ninvalid opcode: 0000 [#1] PREEMPT SMP\nCPU: 1 PID: 8343 Comm: dmsetup Not tainted 6.8.0-rc6 #4\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\nRIP: 0010:__list_del_entry_valid_or_report+0x77/0xc0\n\u003csnip\u003e\nRSP: 0018:ffff8881b831bcc0 EFLAGS: 00010282\nRAX: 000000000000004e RBX: ffff888143b6eb80 RCX: 0000000000000000\nRDX: 0000000000000001 RSI: ffffffff819053d0 RDI: 00000000ffffffff\nRBP: ffff8881b83a3400 R08: 00000000fffeffff R09: 0000000000000058\nR10: 0000000000000000 R11: ffffffff81a24080 R12: 0000000000000001\nR13: ffff88814538e000 R14: ffff888143bc6dc0 R15: ffffffffa02e4bb0\nFS: 00000000f7c0f780(0000) GS:ffff8893f0a40000(0000) knlGS:0000000000000000\nCS: 0010 DS: 002b ES: 002b CR0: 0000000080050033\nCR2: 0000000057fb5000 CR3: 0000000143474000 CR4: 00000000000006b0\nCall Trace:\n \u003cTASK\u003e\n ? die+0x2d/0x80\n ? do_trap+0xeb/0xf0\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? do_error_trap+0x60/0x80\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? exc_invalid_op+0x49/0x60\n ? __list_del_entry_valid_or_report+0x77/0xc0\n ? asm_exc_invalid_op+0x16/0x20\n ? table_deps+0x1b0/0x1b0 [dm_mod]\n ? __list_del_entry_valid_or_report+0x77/0xc0\n origin_postsuspend+0x1a/0x50 [dm_snapshot]\n dm_table_postsuspend_targets+0x34/0x50 [dm_mod]\n dm_suspend+0xd8/0xf0 [dm_mod]\n dev_suspend+0x1f2/0x2f0 [dm_mod]\n ? table_deps+0x1b0/0x1b0 [dm_mod]\n ctl_ioctl+0x300/0x5f0 [dm_mod]\n dm_compat_ctl_ioctl+0x7/0x10 [dm_mod]\n __x64_compat_sys_ioctl+0x104/0x170\n do_syscall_64+0x184/0x1b0\n entry_SYSCALL_64_after_hwframe+0x46/0x4e\nRIP: 0033:0xf7e6aead\n\u003csnip\u003e\n---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26880",
"url": "https://www.suse.com/security/cve/CVE-2024-26880"
},
{
"category": "external",
"summary": "SUSE Bug 1223188 for CVE-2024-26880",
"url": "https://bugzilla.suse.com/1223188"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "low"
}
],
"title": "CVE-2024-26880"
},
{
"cve": "CVE-2024-26894",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26894"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()\n\nAfter unregistering the CPU idle device, the memory associated with\nit is not freed, leading to a memory leak:\n\nunreferenced object 0xffff896282f6c000 (size 1024):\n comm \"swapper/0\", pid 1, jiffies 4294893170\n hex dump (first 32 bytes):\n 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 8836a742):\n [\u003cffffffff993495ed\u003e] kmalloc_trace+0x29d/0x340\n [\u003cffffffff9972f3b3\u003e] acpi_processor_power_init+0xf3/0x1c0\n [\u003cffffffff9972d263\u003e] __acpi_processor_start+0xd3/0xf0\n [\u003cffffffff9972d2bc\u003e] acpi_processor_start+0x2c/0x50\n [\u003cffffffff99805872\u003e] really_probe+0xe2/0x480\n [\u003cffffffff99805c98\u003e] __driver_probe_device+0x78/0x160\n [\u003cffffffff99805daf\u003e] driver_probe_device+0x1f/0x90\n [\u003cffffffff9980601e\u003e] __driver_attach+0xce/0x1c0\n [\u003cffffffff99803170\u003e] bus_for_each_dev+0x70/0xc0\n [\u003cffffffff99804822\u003e] bus_add_driver+0x112/0x210\n [\u003cffffffff99807245\u003e] driver_register+0x55/0x100\n [\u003cffffffff9aee4acb\u003e] acpi_processor_driver_init+0x3b/0xc0\n [\u003cffffffff990012d1\u003e] do_one_initcall+0x41/0x300\n [\u003cffffffff9ae7c4b0\u003e] kernel_init_freeable+0x320/0x470\n [\u003cffffffff99b231f6\u003e] kernel_init+0x16/0x1b0\n [\u003cffffffff99042e6d\u003e] ret_from_fork+0x2d/0x50\n\nFix this by freeing the CPU idle device after unregistering it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26894",
"url": "https://www.suse.com/security/cve/CVE-2024-26894"
},
{
"category": "external",
"summary": "SUSE Bug 1223043 for CVE-2024-26894",
"url": "https://bugzilla.suse.com/1223043"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26894"
},
{
"cve": "CVE-2024-26923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix garbage collector racing against connect()\n\nGarbage collector does not take into account the risk of embryo getting\nenqueued during the garbage collection. If such embryo has a peer that\ncarries SCM_RIGHTS, two consecutive passes of scan_children() may see a\ndifferent set of children. Leading to an incorrectly elevated inflight\ncount, and then a dangling pointer within the gc_inflight_list.\n\nsockets are AF_UNIX/SOCK_STREAM\nS is an unconnected socket\nL is a listening in-flight socket bound to addr, not in fdtable\nV\u0027s fd will be passed via sendmsg(), gets inflight count bumped\n\nconnect(S, addr)\tsendmsg(S, [V]); close(V)\t__unix_gc()\n----------------\t-------------------------\t-----------\n\nNS = unix_create1()\nskb1 = sock_wmalloc(NS)\nL = unix_find_other(addr)\nunix_state_lock(L)\nunix_peer(S) = NS\n\t\t\t// V count=1 inflight=0\n\n \t\t\tNS = unix_peer(S)\n \t\t\tskb2 = sock_alloc()\n\t\t\tskb_queue_tail(NS, skb2[V])\n\n\t\t\t// V became in-flight\n\t\t\t// V count=2 inflight=1\n\n\t\t\tclose(V)\n\n\t\t\t// V count=1 inflight=1\n\t\t\t// GC candidate condition met\n\n\t\t\t\t\t\tfor u in gc_inflight_list:\n\t\t\t\t\t\t if (total_refs == inflight_refs)\n\t\t\t\t\t\t add u to gc_candidates\n\n\t\t\t\t\t\t// gc_candidates={L, V}\n\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t scan_children(u, dec_inflight)\n\n\t\t\t\t\t\t// embryo (skb1) was not\n\t\t\t\t\t\t// reachable from L yet, so V\u0027s\n\t\t\t\t\t\t// inflight remains unchanged\n__skb_queue_tail(L, skb1)\nunix_state_unlock(L)\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t if (u.inflight)\n\t\t\t\t\t\t scan_children(u, inc_inflight_move_tail)\n\n\t\t\t\t\t\t// V count=1 inflight=2 (!)\n\nIf there is a GC-candidate listening socket, lock/unlock its state. This\nmakes GC wait until the end of any ongoing connect() to that socket. After\nflipping the lock, a possibly SCM-laden embryo is already enqueued. And if\nthere is another embryo coming, it can not possibly carry SCM_RIGHTS. At\nthis point, unix_inflight() can not happen because unix_gc_lock is already\ntaken. Inflight graph remains unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26923",
"url": "https://www.suse.com/security/cve/CVE-2024-26923"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-26923",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1223683 for CVE-2024-26923",
"url": "https://bugzilla.suse.com/1223683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26923"
},
{
"cve": "CVE-2024-26928",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26928"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_debug_files_proc_show()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26928",
"url": "https://www.suse.com/security/cve/CVE-2024-26928"
},
{
"category": "external",
"summary": "SUSE Bug 1223532 for CVE-2024-26928",
"url": "https://bugzilla.suse.com/1223532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26928"
},
{
"cve": "CVE-2024-26973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26973"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfat: fix uninitialized field in nostale filehandles\n\nWhen fat_encode_fh_nostale() encodes file handle without a parent it\nstores only first 10 bytes of the file handle. However the length of the\nfile handle must be a multiple of 4 so the file handle is actually 12\nbytes long and the last two bytes remain uninitialized. This is not\ngreat at we potentially leak uninitialized information with the handle\nto userspace. Properly initialize the full handle length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26973",
"url": "https://www.suse.com/security/cve/CVE-2024-26973"
},
{
"category": "external",
"summary": "SUSE Bug 1223641 for CVE-2024-26973",
"url": "https://bugzilla.suse.com/1223641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-26973"
},
{
"cve": "CVE-2024-27399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27399"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout\n\nThere is a race condition between l2cap_chan_timeout() and\nl2cap_chan_del(). When we use l2cap_chan_del() to delete the\nchannel, the chan-\u003econn will be set to null. But the conn could\nbe dereferenced again in the mutex_lock() of l2cap_chan_timeout().\nAs a result the null pointer dereference bug will happen. The\nKASAN report triggered by POC is shown below:\n\n[ 472.074580] ==================================================================\n[ 472.075284] BUG: KASAN: null-ptr-deref in mutex_lock+0x68/0xc0\n[ 472.075308] Write of size 8 at addr 0000000000000158 by task kworker/0:0/7\n[ 472.075308]\n[ 472.075308] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.9.0-rc5-00356-g78c0094a146b #36\n[ 472.075308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[ 472.075308] Workqueue: events l2cap_chan_timeout\n[ 472.075308] Call Trace:\n[ 472.075308] \u003cTASK\u003e\n[ 472.075308] dump_stack_lvl+0x137/0x1a0\n[ 472.075308] print_report+0x101/0x250\n[ 472.075308] ? __virt_addr_valid+0x77/0x160\n[ 472.075308] ? mutex_lock+0x68/0xc0\n[ 472.075308] kasan_report+0x139/0x170\n[ 472.075308] ? mutex_lock+0x68/0xc0\n[ 472.075308] kasan_check_range+0x2c3/0x2e0\n[ 472.075308] mutex_lock+0x68/0xc0\n[ 472.075308] l2cap_chan_timeout+0x181/0x300\n[ 472.075308] process_one_work+0x5d2/0xe00\n[ 472.075308] worker_thread+0xe1d/0x1660\n[ 472.075308] ? pr_cont_work+0x5e0/0x5e0\n[ 472.075308] kthread+0x2b7/0x350\n[ 472.075308] ? pr_cont_work+0x5e0/0x5e0\n[ 472.075308] ? kthread_blkcg+0xd0/0xd0\n[ 472.075308] ret_from_fork+0x4d/0x80\n[ 472.075308] ? kthread_blkcg+0xd0/0xd0\n[ 472.075308] ret_from_fork_asm+0x11/0x20\n[ 472.075308] \u003c/TASK\u003e\n[ 472.075308] ==================================================================\n[ 472.094860] Disabling lock debugging due to kernel taint\n[ 472.096136] BUG: kernel NULL pointer dereference, address: 0000000000000158\n[ 472.096136] #PF: supervisor write access in kernel mode\n[ 472.096136] #PF: error_code(0x0002) - not-present page\n[ 472.096136] PGD 0 P4D 0\n[ 472.096136] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI\n[ 472.096136] CPU: 0 PID: 7 Comm: kworker/0:0 Tainted: G B 6.9.0-rc5-00356-g78c0094a146b #36\n[ 472.096136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[ 472.096136] Workqueue: events l2cap_chan_timeout\n[ 472.096136] RIP: 0010:mutex_lock+0x88/0xc0\n[ 472.096136] Code: be 08 00 00 00 e8 f8 23 1f fd 4c 89 f7 be 08 00 00 00 e8 eb 23 1f fd 42 80 3c 23 00 74 08 48 88\n[ 472.096136] RSP: 0018:ffff88800744fc78 EFLAGS: 00000246\n[ 472.096136] RAX: 0000000000000000 RBX: 1ffff11000e89f8f RCX: ffffffff8457c865\n[ 472.096136] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88800744fc78\n[ 472.096136] RBP: 0000000000000158 R08: ffff88800744fc7f R09: 1ffff11000e89f8f\n[ 472.096136] R10: dffffc0000000000 R11: ffffed1000e89f90 R12: dffffc0000000000\n[ 472.096136] R13: 0000000000000158 R14: ffff88800744fc78 R15: ffff888007405a00\n[ 472.096136] FS: 0000000000000000(0000) GS:ffff88806d200000(0000) knlGS:0000000000000000\n[ 472.096136] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 472.096136] CR2: 0000000000000158 CR3: 000000000da32000 CR4: 00000000000006f0\n[ 472.096136] Call Trace:\n[ 472.096136] \u003cTASK\u003e\n[ 472.096136] ? __die_body+0x8d/0xe0\n[ 472.096136] ? page_fault_oops+0x6b8/0x9a0\n[ 472.096136] ? kernelmode_fixup_or_oops+0x20c/0x2a0\n[ 472.096136] ? do_user_addr_fault+0x1027/0x1340\n[ 472.096136] ? _printk+0x7a/0xa0\n[ 472.096136] ? mutex_lock+0x68/0xc0\n[ 472.096136] ? add_taint+0x42/0xd0\n[ 472.096136] ? exc_page_fault+0x6a/0x1b0\n[ 472.096136] ? asm_exc_page_fault+0x26/0x30\n[ 472.096136] ? mutex_lock+0x75/0xc0\n[ 472.096136] ? mutex_lock+0x88/0xc0\n[ 472.096136] ? mutex_lock+0x75/0xc0\n[ 472.096136] l2cap_chan_timeo\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27399",
"url": "https://www.suse.com/security/cve/CVE-2024-27399"
},
{
"category": "external",
"summary": "SUSE Bug 1224177 for CVE-2024-27399",
"url": "https://bugzilla.suse.com/1224177"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-27399"
},
{
"cve": "CVE-2024-27410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27410"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: reject iftype change with mesh ID change\n\nIt\u0027s currently possible to change the mesh ID when the\ninterface isn\u0027t yet in mesh mode, at the same time as\nchanging it into mesh mode. This leads to an overwrite\nof data in the wdev-\u003eu union for the interface type it\ncurrently has, causing cfg80211_change_iface() to do\nwrong things when switching.\n\nWe could probably allow setting an interface to mesh\nwhile setting the mesh ID at the same time by doing a\ndifferent order of operations here, but realistically\nthere\u0027s no userspace that\u0027s going to do this, so just\ndisallow changes in iftype when setting mesh ID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27410",
"url": "https://www.suse.com/security/cve/CVE-2024-27410"
},
{
"category": "external",
"summary": "SUSE Bug 1224432 for CVE-2024-27410",
"url": "https://bugzilla.suse.com/1224432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-27410"
},
{
"cve": "CVE-2024-35247",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35247"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: region: add owner module and take its refcount\n\nThe current implementation of the fpga region assumes that the low-level\nmodule registers a driver for the parent device and uses its owner pointer\nto take the module\u0027s refcount. This approach is problematic since it can\nlead to a null pointer dereference while attempting to get the region\nduring programming if the parent device does not have a driver.\n\nTo address this problem, add a module owner pointer to the fpga_region\nstruct and use it to take the module\u0027s refcount. Modify the functions for\nregistering a region to take an additional owner module parameter and\nrename them to avoid conflicts. Use the old function names for helper\nmacros that automatically set the module that registers the region as the\nowner. This ensures compatibility with existing low-level control modules\nand reduces the chances of registering a region without setting the owner.\n\nAlso, update the documentation to keep it consistent with the new interface\nfor registering an fpga region.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35247",
"url": "https://www.suse.com/security/cve/CVE-2024-35247"
},
{
"category": "external",
"summary": "SUSE Bug 1226948 for CVE-2024-35247",
"url": "https://bugzilla.suse.com/1226948"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35247"
},
{
"cve": "CVE-2024-35805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35805"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm snapshot: fix lockup in dm_exception_table_exit\n\nThere was reported lockup when we exit a snapshot with many exceptions.\nFix this by adding \"cond_resched\" to the loop that frees the exceptions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35805",
"url": "https://www.suse.com/security/cve/CVE-2024-35805"
},
{
"category": "external",
"summary": "SUSE Bug 1224743 for CVE-2024-35805",
"url": "https://bugzilla.suse.com/1224743"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35805"
},
{
"cve": "CVE-2024-35807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35807"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix corruption during on-line resize\n\nWe observed a corruption during on-line resize of a file system that is\nlarger than 16 TiB with 4k block size. With having more then 2^32 blocks\nresize_inode is turned off by default by mke2fs. The issue can be\nreproduced on a smaller file system for convenience by explicitly\nturning off resize_inode. An on-line resize across an 8 GiB boundary (the\nsize of a meta block group in this setup) then leads to a corruption:\n\n dev=/dev/\u003csome_dev\u003e # should be \u003e= 16 GiB\n mkdir -p /corruption\n /sbin/mke2fs -t ext4 -b 4096 -O ^resize_inode $dev $((2 * 2**21 - 2**15))\n mount -t ext4 $dev /corruption\n\n dd if=/dev/zero bs=4096 of=/corruption/test count=$((2*2**21 - 4*2**15))\n sha1sum /corruption/test\n # 79d2658b39dcfd77274e435b0934028adafaab11 /corruption/test\n\n /sbin/resize2fs $dev $((2*2**21))\n # drop page cache to force reload the block from disk\n echo 1 \u003e /proc/sys/vm/drop_caches\n\n sha1sum /corruption/test\n # 3c2abc63cbf1a94c9e6977e0fbd72cd832c4d5c3 /corruption/test\n\n2^21 = 2^15*2^6 equals 8 GiB whereof 2^15 is the number of blocks per\nblock group and 2^6 are the number of block groups that make a meta\nblock group.\n\nThe last checksum might be different depending on how the file is laid\nout across the physical blocks. The actual corruption occurs at physical\nblock 63*2^15 = 2064384 which would be the location of the backup of the\nmeta block group\u0027s block descriptor. During the on-line resize the file\nsystem will be converted to meta_bg starting at s_first_meta_bg which is\n2 in the example - meaning all block groups after 16 GiB. However, in\next4_flex_group_add we might add block groups that are not part of the\nfirst meta block group yet. In the reproducer we achieved this by\nsubstracting the size of a whole block group from the point where the\nmeta block group would start. This must be considered when updating the\nbackup block group descriptors to follow the non-meta_bg layout. The fix\nis to add a test whether the group to add is already part of the meta\nblock group or not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35807",
"url": "https://www.suse.com/security/cve/CVE-2024-35807"
},
{
"category": "external",
"summary": "SUSE Bug 1224735 for CVE-2024-35807",
"url": "https://bugzilla.suse.com/1224735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35807"
},
{
"cve": "CVE-2024-35819",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35819"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsoc: fsl: qbman: Use raw spinlock for cgr_lock\n\nsmp_call_function always runs its callback in hard IRQ context, even on\nPREEMPT_RT, where spinlocks can sleep. So we need to use a raw spinlock\nfor cgr_lock to ensure we aren\u0027t waiting on a sleeping task.\n\nAlthough this bug has existed for a while, it was not apparent until\ncommit ef2a8d5478b9 (\"net: dpaa: Adjust queue depth on rate change\")\nwhich invokes smp_call_function_single via qman_update_cgr_safe every\ntime a link goes up or down.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35819",
"url": "https://www.suse.com/security/cve/CVE-2024-35819"
},
{
"category": "external",
"summary": "SUSE Bug 1224683 for CVE-2024-35819",
"url": "https://bugzilla.suse.com/1224683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35819"
},
{
"cve": "CVE-2024-35822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: udc: remove warning when queue disabled ep\n\nIt is possible trigger below warning message from mass storage function,\n\nWARNING: CPU: 6 PID: 3839 at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104\npc : usb_ep_queue+0x7c/0x104\nlr : fsg_main_thread+0x494/0x1b3c\n\nRoot cause is mass storage function try to queue request from main thread,\nbut other thread may already disable ep when function disable.\n\nAs there is no function failure in the driver, in order to avoid effort\nto fix warning, change WARN_ON_ONCE() in usb_ep_queue() to pr_debug().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35822",
"url": "https://www.suse.com/security/cve/CVE-2024-35822"
},
{
"category": "external",
"summary": "SUSE Bug 1224739 for CVE-2024-35822",
"url": "https://bugzilla.suse.com/1224739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "low"
}
],
"title": "CVE-2024-35822"
},
{
"cve": "CVE-2024-35828",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35828"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer()\n\nIn the for statement of lbs_allocate_cmd_buffer(), if the allocation of\ncmdarray[i].cmdbuf fails, both cmdarray and cmdarray[i].cmdbuf needs to\nbe freed. Otherwise, there will be memleaks in lbs_allocate_cmd_buffer().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35828",
"url": "https://www.suse.com/security/cve/CVE-2024-35828"
},
{
"category": "external",
"summary": "SUSE Bug 1224622 for CVE-2024-35828",
"url": "https://bugzilla.suse.com/1224622"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35828"
},
{
"cve": "CVE-2024-35835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35835"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: fix a double-free in arfs_create_groups\n\nWhen `in` allocated by kvzalloc fails, arfs_create_groups will free\nft-\u003eg and return an error. However, arfs_create_table, the only caller of\narfs_create_groups, will hold this error and call to\nmlx5e_destroy_flow_table, in which the ft-\u003eg will be freed again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35835",
"url": "https://www.suse.com/security/cve/CVE-2024-35835"
},
{
"category": "external",
"summary": "SUSE Bug 1224605 for CVE-2024-35835",
"url": "https://bugzilla.suse.com/1224605"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35835"
},
{
"cve": "CVE-2024-35862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35862"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_network_name_deleted()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35862",
"url": "https://www.suse.com/security/cve/CVE-2024-35862"
},
{
"category": "external",
"summary": "SUSE Bug 1224764 for CVE-2024-35862",
"url": "https://bugzilla.suse.com/1224764"
},
{
"category": "external",
"summary": "SUSE Bug 1225311 for CVE-2024-35862",
"url": "https://bugzilla.suse.com/1225311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2024-35862"
},
{
"cve": "CVE-2024-35863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35863"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in is_valid_oplock_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35863",
"url": "https://www.suse.com/security/cve/CVE-2024-35863"
},
{
"category": "external",
"summary": "SUSE Bug 1224763 for CVE-2024-35863",
"url": "https://bugzilla.suse.com/1224763"
},
{
"category": "external",
"summary": "SUSE Bug 1225011 for CVE-2024-35863",
"url": "https://bugzilla.suse.com/1225011"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2024-35863"
},
{
"cve": "CVE-2024-35864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35864"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_valid_lease_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35864",
"url": "https://www.suse.com/security/cve/CVE-2024-35864"
},
{
"category": "external",
"summary": "SUSE Bug 1224765 for CVE-2024-35864",
"url": "https://bugzilla.suse.com/1224765"
},
{
"category": "external",
"summary": "SUSE Bug 1225309 for CVE-2024-35864",
"url": "https://bugzilla.suse.com/1225309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2024-35864"
},
{
"cve": "CVE-2024-35865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35865"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_valid_oplock_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35865",
"url": "https://www.suse.com/security/cve/CVE-2024-35865"
},
{
"category": "external",
"summary": "SUSE Bug 1224668 for CVE-2024-35865",
"url": "https://bugzilla.suse.com/1224668"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35865"
},
{
"cve": "CVE-2024-35867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35867"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_stats_proc_show()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35867",
"url": "https://www.suse.com/security/cve/CVE-2024-35867"
},
{
"category": "external",
"summary": "SUSE Bug 1224664 for CVE-2024-35867",
"url": "https://bugzilla.suse.com/1224664"
},
{
"category": "external",
"summary": "SUSE Bug 1225012 for CVE-2024-35867",
"url": "https://bugzilla.suse.com/1225012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2024-35867"
},
{
"cve": "CVE-2024-35868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35868"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_stats_proc_write()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35868",
"url": "https://www.suse.com/security/cve/CVE-2024-35868"
},
{
"category": "external",
"summary": "SUSE Bug 1224678 for CVE-2024-35868",
"url": "https://bugzilla.suse.com/1224678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35868"
},
{
"cve": "CVE-2024-35870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35870"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix UAF in smb2_reconnect_server()\n\nThe UAF bug is due to smb2_reconnect_server() accessing a session that\nis already being teared down by another thread that is executing\n__cifs_put_smb_ses(). This can happen when (a) the client has\nconnection to the server but no session or (b) another thread ends up\nsetting @ses-\u003eses_status again to something different than\nSES_EXITING.\n\nTo fix this, we need to make sure to unconditionally set\n@ses-\u003eses_status to SES_EXITING and prevent any other threads from\nsetting a new status while we\u0027re still tearing it down.\n\nThe following can be reproduced by adding some delay to right after\nthe ipc is freed in __cifs_put_smb_ses() - which will give\nsmb2_reconnect_server() worker a chance to run and then accessing\n@ses-\u003eipc:\n\nkinit ...\nmount.cifs //srv/share /mnt/1 -o sec=krb5,nohandlecache,echo_interval=10\n[disconnect srv]\nls /mnt/1 \u0026\u003e/dev/null\nsleep 30\nkdestroy\n[reconnect srv]\nsleep 10\numount /mnt/1\n...\nCIFS: VFS: Verify user has a krb5 ticket and keyutils is installed\nCIFS: VFS: \\\\srv Send error in SessSetup = -126\nCIFS: VFS: Verify user has a krb5 ticket and keyutils is installed\nCIFS: VFS: \\\\srv Send error in SessSetup = -126\ngeneral protection fault, probably for non-canonical address\n0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc2 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39\n04/01/2014\nWorkqueue: cifsiod smb2_reconnect_server [cifs]\nRIP: 0010:__list_del_entry_valid_or_report+0x33/0xf0\nCode: 4f 08 48 85 d2 74 42 48 85 c9 74 59 48 b8 00 01 00 00 00 00 ad\nde 48 39 c2 74 61 48 b8 22 01 00 00 00 00 74 69 \u003c48\u003e 8b 01 48 39 f8 75\n7b 48 8b 72 08 48 39 c6 0f 85 88 00 00 00 b8\nRSP: 0018:ffffc900001bfd70 EFLAGS: 00010a83\nRAX: dead000000000122 RBX: ffff88810da53838 RCX: 6b6b6b6b6b6b6b6b\nRDX: 6b6b6b6b6b6b6b6b RSI: ffffffffc02f6878 RDI: ffff88810da53800\nRBP: ffff88810da53800 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000001 R12: ffff88810c064000\nR13: 0000000000000001 R14: ffff88810c064000 R15: ffff8881039cc000\nFS: 0000000000000000(0000) GS:ffff888157c00000(0000)\nknlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe3728b1000 CR3: 000000010caa4000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? die_addr+0x36/0x90\n ? exc_general_protection+0x1c1/0x3f0\n ? asm_exc_general_protection+0x26/0x30\n ? __list_del_entry_valid_or_report+0x33/0xf0\n __cifs_put_smb_ses+0x1ae/0x500 [cifs]\n smb2_reconnect_server+0x4ed/0x710 [cifs]\n process_one_work+0x205/0x6b0\n worker_thread+0x191/0x360\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xe2/0x110\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35870",
"url": "https://www.suse.com/security/cve/CVE-2024-35870"
},
{
"category": "external",
"summary": "SUSE Bug 1224672 for CVE-2024-35870",
"url": "https://bugzilla.suse.com/1224672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35870"
},
{
"cve": "CVE-2024-35886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35886"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix infinite recursion in fib6_dump_done().\n\nsyzkaller reported infinite recursive calls of fib6_dump_done() during\nnetlink socket destruction. [1]\n\nFrom the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then\nthe response was generated. The following recvmmsg() resumed the dump\nfor IPv6, but the first call of inet6_dump_fib() failed at kzalloc() due\nto the fault injection. [0]\n\n 12:01:34 executing program 3:\n r0 = socket$nl_route(0x10, 0x3, 0x0)\n sendmsg$nl_route(r0, ... snip ...)\n recvmmsg(r0, ... snip ...) (fail_nth: 8)\n\nHere, fib6_dump_done() was set to nlk_sk(sk)-\u003ecb.done, and the next call\nof inet6_dump_fib() set it to nlk_sk(sk)-\u003ecb.args[3]. syzkaller stopped\nreceiving the response halfway through, and finally netlink_sock_destruct()\ncalled nlk_sk(sk)-\u003ecb.done().\n\nfib6_dump_done() calls fib6_dump_end() and nlk_sk(sk)-\u003ecb.done() if it\nis still not NULL. fib6_dump_end() rewrites nlk_sk(sk)-\u003ecb.done() by\nnlk_sk(sk)-\u003ecb.args[3], but it has the same function, not NULL, calling\nitself recursively and hitting the stack guard page.\n\nTo avoid the issue, let\u0027s set the destructor after kzalloc().\n\n[0]:\nFAULT_INJECTION: forcing a failure.\nname failslab, interval 1, probability 0, space 0, times 0\nCPU: 1 PID: 432110 Comm: syz-executor.3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl (lib/dump_stack.c:117)\n should_fail_ex (lib/fault-inject.c:52 lib/fault-inject.c:153)\n should_failslab (mm/slub.c:3733)\n kmalloc_trace (mm/slub.c:3748 mm/slub.c:3827 mm/slub.c:3992)\n inet6_dump_fib (./include/linux/slab.h:628 ./include/linux/slab.h:749 net/ipv6/ip6_fib.c:662)\n rtnl_dump_all (net/core/rtnetlink.c:4029)\n netlink_dump (net/netlink/af_netlink.c:2269)\n netlink_recvmsg (net/netlink/af_netlink.c:1988)\n ____sys_recvmsg (net/socket.c:1046 net/socket.c:2801)\n ___sys_recvmsg (net/socket.c:2846)\n do_recvmmsg (net/socket.c:2943)\n __x64_sys_recvmmsg (net/socket.c:3041 net/socket.c:3034 net/socket.c:3034)\n\n[1]:\nBUG: TASK stack guard page was hit at 00000000f2fa9af1 (stack is 00000000b7912430..000000009a436beb)\nstack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 1 PID: 223719 Comm: kworker/1:3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nWorkqueue: events netlink_sock_destruct_work\nRIP: 0010:fib6_dump_done (net/ipv6/ip6_fib.c:570)\nCode: 3c 24 e8 f3 e9 51 fd e9 28 fd ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 41 57 41 56 41 55 41 54 55 48 89 fd \u003c53\u003e 48 8d 5d 60 e8 b6 4d 07 fd 48 89 da 48 b8 00 00 00 00 00 fc ff\nRSP: 0018:ffffc9000d980000 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffffffff84405990 RCX: ffffffff844059d3\nRDX: ffff8881028e0000 RSI: ffffffff84405ac2 RDI: ffff88810c02f358\nRBP: ffff88810c02f358 R08: 0000000000000007 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000224 R12: 0000000000000000\nR13: ffff888007c82c78 R14: ffff888007c82c68 R15: ffff888007c82c68\nFS: 0000000000000000(0000) GS:ffff88811b100000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000d97fff8 CR3: 0000000102309002 CR4: 0000000000770ef0\nPKRU: 55555554\nCall Trace:\n \u003c#DF\u003e\n \u003c/#DF\u003e\n \u003cTASK\u003e\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n ...\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n netlink_sock_destruct (net/netlink/af_netlink.c:401)\n __sk_destruct (net/core/sock.c:2177 (discriminator 2))\n sk_destruct (net/core/sock.c:2224)\n __sk_free (net/core/sock.c:2235)\n sk_free (net/core/sock.c:2246)\n process_one_work (kernel/workqueue.c:3259)\n worker_thread (kernel/workqueue.c:3329 kernel/workqueue.\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35886",
"url": "https://www.suse.com/security/cve/CVE-2024-35886"
},
{
"category": "external",
"summary": "SUSE Bug 1224670 for CVE-2024-35886",
"url": "https://bugzilla.suse.com/1224670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35886"
},
{
"cve": "CVE-2024-35896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35896"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: validate user input for expected length\n\nI got multiple syzbot reports showing old bugs exposed\nby BPF after commit 20f2505fb436 (\"bpf: Try to avoid kzalloc\nin cgroup/{s,g}etsockopt\")\n\nsetsockopt() @optlen argument should be taken into account\nbefore copying data.\n\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]\n BUG: KASAN: slab-out-of-bounds in do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]\n BUG: KASAN: slab-out-of-bounds in do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627\nRead of size 96 at addr ffff88802cd73da0 by task syz-executor.4/7238\n\nCPU: 1 PID: 7238 Comm: syz-executor.4 Not tainted 6.9.0-rc2-next-20240403-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105\n copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n copy_from_sockptr include/linux/sockptr.h:55 [inline]\n do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]\n do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627\n nf_setsockopt+0x295/0x2c0 net/netfilter/nf_sockopt.c:101\n do_sock_setsockopt+0x3af/0x720 net/socket.c:2311\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x72/0x7a\nRIP: 0033:0x7fd22067dde9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fd21f9ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036\nRAX: ffffffffffffffda RBX: 00007fd2207abf80 RCX: 00007fd22067dde9\nRDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003\nRBP: 00007fd2206ca47a R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000020000880 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007fd2207abf80 R15: 00007ffd2d0170d8\n \u003c/TASK\u003e\n\nAllocated by task 7238:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:370 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387\n kasan_kmalloc include/linux/kasan.h:211 [inline]\n __do_kmalloc_node mm/slub.c:4069 [inline]\n __kmalloc_noprof+0x200/0x410 mm/slub.c:4082\n kmalloc_noprof include/linux/slab.h:664 [inline]\n __cgroup_bpf_run_filter_setsockopt+0xd47/0x1050 kernel/bpf/cgroup.c:1869\n do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x72/0x7a\n\nThe buggy address belongs to the object at ffff88802cd73da0\n which belongs to the cache kmalloc-8 of size 8\nThe buggy address is located 0 bytes inside of\n allocated 1-byte region [ffff88802cd73da0, ffff88802cd73da1)\n\nThe buggy address belongs to the physical page:\npage: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802cd73020 pfn:0x2cd73\nflags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff)\npage_type: 0xffffefff(slab)\nraw: 00fff80000000000 ffff888015041280 dead000000000100 dead000000000122\nraw: ffff88802cd73020 000000008080007f 00000001ffffefff 00\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35896",
"url": "https://www.suse.com/security/cve/CVE-2024-35896"
},
{
"category": "external",
"summary": "SUSE Bug 1224662 for CVE-2024-35896",
"url": "https://bugzilla.suse.com/1224662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35896"
},
{
"cve": "CVE-2024-35922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35922"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbmon: prevent division by zero in fb_videomode_from_videomode()\n\nThe expression htotal * vtotal can have a zero value on\noverflow. It is necessary to prevent division by zero like in\nfb_var_to_videomode().\n\nFound by Linux Verification Center (linuxtesting.org) with Svace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35922",
"url": "https://www.suse.com/security/cve/CVE-2024-35922"
},
{
"category": "external",
"summary": "SUSE Bug 1224660 for CVE-2024-35922",
"url": "https://bugzilla.suse.com/1224660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35922"
},
{
"cve": "CVE-2024-35925",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35925"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: prevent division by zero in blk_rq_stat_sum()\n\nThe expression dst-\u003enr_samples + src-\u003enr_samples may\nhave zero value on overflow. It is necessary to add\na check to avoid division by zero.\n\nFound by Linux Verification Center (linuxtesting.org) with Svace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35925",
"url": "https://www.suse.com/security/cve/CVE-2024-35925"
},
{
"category": "external",
"summary": "SUSE Bug 1224661 for CVE-2024-35925",
"url": "https://bugzilla.suse.com/1224661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35925"
},
{
"cve": "CVE-2024-35930",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35930"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()\n\nThe call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an\nunsuccessful status. In such cases, the elsiocb is not issued, the\ncompletion is not called, and thus the elsiocb resource is leaked.\n\nCheck return value after calling lpfc_sli4_resume_rpi() and conditionally\nrelease the elsiocb resource.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35930",
"url": "https://www.suse.com/security/cve/CVE-2024-35930"
},
{
"category": "external",
"summary": "SUSE Bug 1224651 for CVE-2024-35930",
"url": "https://bugzilla.suse.com/1224651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35930"
},
{
"cve": "CVE-2024-35947",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35947"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndyndbg: fix old BUG_ON in \u003econtrol parser\n\nFix a BUG_ON from 2009. Even if it looks \"unreachable\" (I didn\u0027t\nreally look), lets make sure by removing it, doing pr_err and return\n-EINVAL instead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35947",
"url": "https://www.suse.com/security/cve/CVE-2024-35947"
},
{
"category": "external",
"summary": "SUSE Bug 1224647 for CVE-2024-35947",
"url": "https://bugzilla.suse.com/1224647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35947"
},
{
"cve": "CVE-2024-35950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35950"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fully protect modes[] with dev-\u003emode_config.mutex\n\nThe modes[] array contains pointers to modes on the connectors\u0027\nmode lists, which are protected by dev-\u003emode_config.mutex.\nThus we need to extend modes[] the same protection or by the\ntime we use it the elements may already be pointing to\nfreed/reused memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35950",
"url": "https://www.suse.com/security/cve/CVE-2024-35950"
},
{
"category": "external",
"summary": "SUSE Bug 1224703 for CVE-2024-35950",
"url": "https://bugzilla.suse.com/1224703"
},
{
"category": "external",
"summary": "SUSE Bug 1225310 for CVE-2024-35950",
"url": "https://bugzilla.suse.com/1225310"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35950"
},
{
"cve": "CVE-2024-35956",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35956"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations\n\nCreate subvolume, create snapshot and delete subvolume all use\nbtrfs_subvolume_reserve_metadata() to reserve metadata for the changes\ndone to the parent subvolume\u0027s fs tree, which cannot be mediated in the\nnormal way via start_transaction. When quota groups (squota or qgroups)\nare enabled, this reserves qgroup metadata of type PREALLOC. Once the\noperation is associated to a transaction, we convert PREALLOC to\nPERTRANS, which gets cleared in bulk at the end of the transaction.\n\nHowever, the error paths of these three operations were not implementing\nthis lifecycle correctly. They unconditionally converted the PREALLOC to\nPERTRANS in a generic cleanup step regardless of errors or whether the\noperation was fully associated to a transaction or not. This resulted in\nerror paths occasionally converting this rsv to PERTRANS without calling\nrecord_root_in_trans successfully, which meant that unless that root got\nrecorded in the transaction by some other thread, the end of the\ntransaction would not free that root\u0027s PERTRANS, leaking it. Ultimately,\nthis resulted in hitting a WARN in CONFIG_BTRFS_DEBUG builds at unmount\nfor the leaked reservation.\n\nThe fix is to ensure that every qgroup PREALLOC reservation observes the\nfollowing properties:\n\n1. any failure before record_root_in_trans is called successfully\n results in freeing the PREALLOC reservation.\n2. after record_root_in_trans, we convert to PERTRANS, and now the\n transaction owns freeing the reservation.\n\nThis patch enforces those properties on the three operations. Without\nit, generic/269 with squotas enabled at mkfs time would fail in ~5-10\nruns on my system. With this patch, it ran successfully 1000 times in a\nrow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35956",
"url": "https://www.suse.com/security/cve/CVE-2024-35956"
},
{
"category": "external",
"summary": "SUSE Bug 1224674 for CVE-2024-35956",
"url": "https://bugzilla.suse.com/1224674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35956"
},
{
"cve": "CVE-2024-35958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35958"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ena: Fix incorrect descriptor free behavior\n\nENA has two types of TX queues:\n- queues which only process TX packets arriving from the network stack\n- queues which only process TX packets forwarded to it by XDP_REDIRECT\n or XDP_TX instructions\n\nThe ena_free_tx_bufs() cycles through all descriptors in a TX queue\nand unmaps + frees every descriptor that hasn\u0027t been acknowledged yet\nby the device (uncompleted TX transactions).\nThe function assumes that the processed TX queue is necessarily from\nthe first category listed above and ends up using napi_consume_skb()\nfor descriptors belonging to an XDP specific queue.\n\nThis patch solves a bug in which, in case of a VF reset, the\ndescriptors aren\u0027t freed correctly, leading to crashes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35958",
"url": "https://www.suse.com/security/cve/CVE-2024-35958"
},
{
"category": "external",
"summary": "SUSE Bug 1224677 for CVE-2024-35958",
"url": "https://bugzilla.suse.com/1224677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35958"
},
{
"cve": "CVE-2024-35960",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35960"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Properly link new fs rules into the tree\n\nPreviously, add_rule_fg would only add newly created rules from the\nhandle into the tree when they had a refcount of 1. On the other hand,\ncreate_flow_handle tries hard to find and reference already existing\nidentical rules instead of creating new ones.\n\nThese two behaviors can result in a situation where create_flow_handle\n1) creates a new rule and references it, then\n2) in a subsequent step during the same handle creation references it\n again,\nresulting in a rule with a refcount of 2 that is not linked into the\ntree, will have a NULL parent and root and will result in a crash when\nthe flow group is deleted because del_sw_hw_rule, invoked on rule\ndeletion, assumes node-\u003eparent is != NULL.\n\nThis happened in the wild, due to another bug related to incorrect\nhandling of duplicate pkt_reformat ids, which lead to the code in\ncreate_flow_handle incorrectly referencing a just-added rule in the same\nflow handle, resulting in the problem described above. Full details are\nat [1].\n\nThis patch changes add_rule_fg to add new rules without parents into\nthe tree, properly initializing them and avoiding the crash. This makes\nit more consistent with how rules are added to an FTE in\ncreate_flow_handle.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35960",
"url": "https://www.suse.com/security/cve/CVE-2024-35960"
},
{
"category": "external",
"summary": "SUSE Bug 1224588 for CVE-2024-35960",
"url": "https://bugzilla.suse.com/1224588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35960"
},
{
"cve": "CVE-2024-35962",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35962"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: complete validation of user input\n\nIn my recent commit, I missed that do_replace() handlers\nuse copy_from_sockptr() (which I fixed), followed\nby unsafe copy_from_sockptr_offset() calls.\n\nIn all functions, we can perform the @optlen validation\nbefore even calling xt_alloc_table_info() with the following\ncheck:\n\nif ((u64)optlen \u003c (u64)tmp.size + sizeof(tmp))\n return -EINVAL;",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35962",
"url": "https://www.suse.com/security/cve/CVE-2024-35962"
},
{
"category": "external",
"summary": "SUSE Bug 1224583 for CVE-2024-35962",
"url": "https://bugzilla.suse.com/1224583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35962"
},
{
"cve": "CVE-2024-35976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35976"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING\n\nsyzbot reported an illegal copy in xsk_setsockopt() [1]\n\nMake sure to validate setsockopt() @optlen parameter.\n\n[1]\n\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]\n BUG: KASAN: slab-out-of-bounds in xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420\nRead of size 4 at addr ffff888028c6cde3 by task syz-executor.0/7549\n\nCPU: 0 PID: 7549 Comm: syz-executor.0 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n copy_from_sockptr include/linux/sockptr.h:55 [inline]\n xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420\n do_sock_setsockopt+0x3af/0x720 net/socket.c:2311\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\nRIP: 0033:0x7fb40587de69\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fb40665a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036\nRAX: ffffffffffffffda RBX: 00007fb4059abf80 RCX: 00007fb40587de69\nRDX: 0000000000000005 RSI: 000000000000011b RDI: 0000000000000006\nRBP: 00007fb4058ca47a R08: 0000000000000002 R09: 0000000000000000\nR10: 0000000020001980 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007fb4059abf80 R15: 00007fff57ee4d08\n \u003c/TASK\u003e\n\nAllocated by task 7549:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:370 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387\n kasan_kmalloc include/linux/kasan.h:211 [inline]\n __do_kmalloc_node mm/slub.c:3966 [inline]\n __kmalloc+0x233/0x4a0 mm/slub.c:3979\n kmalloc include/linux/slab.h:632 [inline]\n __cgroup_bpf_run_filter_setsockopt+0xd2f/0x1040 kernel/bpf/cgroup.c:1869\n do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nThe buggy address belongs to the object at ffff888028c6cde0\n which belongs to the cache kmalloc-8 of size 8\nThe buggy address is located 1 bytes to the right of\n allocated 2-byte region [ffff888028c6cde0, ffff888028c6cde2)\n\nThe buggy address belongs to the physical page:\npage:ffffea0000a31b00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888028c6c9c0 pfn:0x28c6c\nanon flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff)\npage_type: 0xffffffff()\nraw: 00fff00000000800 ffff888014c41280 0000000000000000 dead000000000001\nraw: ffff888028c6c9c0 0000000080800057 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as allocated\npage last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 6648, tgid 6644 (syz-executor.0), ts 133906047828, free_ts 133859922223\n set_page_owner include/linux/page_owner.h:31 [inline]\n post_alloc_hook+0x1ea/0x210 mm/page_alloc.c:1533\n prep_new_page mm/page_alloc.c:\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35976",
"url": "https://www.suse.com/security/cve/CVE-2024-35976"
},
{
"category": "external",
"summary": "SUSE Bug 1224575 for CVE-2024-35976",
"url": "https://bugzilla.suse.com/1224575"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35976"
},
{
"cve": "CVE-2024-35979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35979"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nraid1: fix use-after-free for original bio in raid1_write_request()\n\nr1_bio-\u003ebios[] is used to record new bios that will be issued to\nunderlying disks, however, in raid1_write_request(), r1_bio-\u003ebios[]\nwill set to the original bio temporarily. Meanwhile, if blocked rdev\nis set, free_r1bio() will be called causing that all r1_bio-\u003ebios[]\nto be freed:\n\nraid1_write_request()\n r1_bio = alloc_r1bio(mddev, bio); -\u003e r1_bio-\u003ebios[] is NULL\n for (i = 0; i \u003c disks; i++) -\u003e for each rdev in conf\n // first rdev is normal\n r1_bio-\u003ebios[0] = bio; -\u003e set to original bio\n // second rdev is blocked\n if (test_bit(Blocked, \u0026rdev-\u003eflags))\n break\n\n if (blocked_rdev)\n free_r1bio()\n put_all_bios()\n bio_put(r1_bio-\u003ebios[0]) -\u003e original bio is freed\n\nTest scripts:\n\nmdadm -CR /dev/md0 -l1 -n4 /dev/sd[abcd] --assume-clean\nfio -filename=/dev/md0 -ioengine=libaio -rw=write -bs=4k -numjobs=1 \\\n -iodepth=128 -name=test -direct=1\necho blocked \u003e /sys/block/md0/md/rd2/state\n\nTest result:\n\nBUG bio-264 (Not tainted): Object already free\n-----------------------------------------------------------------------------\n\nAllocated in mempool_alloc_slab+0x24/0x50 age=1 cpu=1 pid=869\n kmem_cache_alloc+0x324/0x480\n mempool_alloc_slab+0x24/0x50\n mempool_alloc+0x6e/0x220\n bio_alloc_bioset+0x1af/0x4d0\n blkdev_direct_IO+0x164/0x8a0\n blkdev_write_iter+0x309/0x440\n aio_write+0x139/0x2f0\n io_submit_one+0x5ca/0xb70\n __do_sys_io_submit+0x86/0x270\n __x64_sys_io_submit+0x22/0x30\n do_syscall_64+0xb1/0x210\n entry_SYSCALL_64_after_hwframe+0x6c/0x74\nFreed in mempool_free_slab+0x1f/0x30 age=1 cpu=1 pid=869\n kmem_cache_free+0x28c/0x550\n mempool_free_slab+0x1f/0x30\n mempool_free+0x40/0x100\n bio_free+0x59/0x80\n bio_put+0xf0/0x220\n free_r1bio+0x74/0xb0\n raid1_make_request+0xadf/0x1150\n md_handle_request+0xc7/0x3b0\n md_submit_bio+0x76/0x130\n __submit_bio+0xd8/0x1d0\n submit_bio_noacct_nocheck+0x1eb/0x5c0\n submit_bio_noacct+0x169/0xd40\n submit_bio+0xee/0x1d0\n blkdev_direct_IO+0x322/0x8a0\n blkdev_write_iter+0x309/0x440\n aio_write+0x139/0x2f0\n\nSince that bios for underlying disks are not allocated yet, fix this\nproblem by using mempool_free() directly to free the r1_bio.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35979",
"url": "https://www.suse.com/security/cve/CVE-2024-35979"
},
{
"category": "external",
"summary": "SUSE Bug 1224572 for CVE-2024-35979",
"url": "https://bugzilla.suse.com/1224572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35979"
},
{
"cve": "CVE-2024-35997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35997"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up\n\nThe flag I2C_HID_READ_PENDING is used to serialize I2C operations.\nHowever, this is not necessary, because I2C core already has its own\nlocking for that.\n\nMore importantly, this flag can cause a lock-up: if the flag is set in\ni2c_hid_xfer() and an interrupt happens, the interrupt handler\n(i2c_hid_irq) will check this flag and return immediately without doing\nanything, then the interrupt handler will be invoked again in an\ninfinite loop.\n\nSince interrupt handler is an RT task, it takes over the CPU and the\nflag-clearing task never gets scheduled, thus we have a lock-up.\n\nDelete this unnecessary flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35997",
"url": "https://www.suse.com/security/cve/CVE-2024-35997"
},
{
"category": "external",
"summary": "SUSE Bug 1224552 for CVE-2024-35997",
"url": "https://bugzilla.suse.com/1224552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35997"
},
{
"cve": "CVE-2024-35998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix lock ordering potential deadlock in cifs_sync_mid_result\n\nCoverity spotted that the cifs_sync_mid_result function could deadlock\n\n\"Thread deadlock (ORDER_REVERSAL) lock_order: Calling spin_lock acquires\nlock TCP_Server_Info.srv_lock while holding lock TCP_Server_Info.mid_lock\"\n\nAddresses-Coverity: 1590401 (\"Thread deadlock (ORDER_REVERSAL)\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35998",
"url": "https://www.suse.com/security/cve/CVE-2024-35998"
},
{
"category": "external",
"summary": "SUSE Bug 1224549 for CVE-2024-35998",
"url": "https://bugzilla.suse.com/1224549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-35998"
},
{
"cve": "CVE-2024-36014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36014"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/arm/malidp: fix a possible null pointer dereference\n\nIn malidp_mw_connector_reset, new memory is allocated with kzalloc, but\nno check is performed. In order to prevent null pointer dereferencing,\nensure that mw_state is checked before calling\n__drm_atomic_helper_connector_reset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36014",
"url": "https://www.suse.com/security/cve/CVE-2024-36014"
},
{
"category": "external",
"summary": "SUSE Bug 1225593 for CVE-2024-36014",
"url": "https://bugzilla.suse.com/1225593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36014"
},
{
"cve": "CVE-2024-36016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36016"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix possible out-of-bounds in gsm0_receive()\n\nAssuming the following:\n- side A configures the n_gsm in basic option mode\n- side B sends the header of a basic option mode frame with data length 1\n- side A switches to advanced option mode\n- side B sends 2 data bytes which exceeds gsm-\u003elen\n Reason: gsm-\u003elen is not used in advanced option mode.\n- side A switches to basic option mode\n- side B keeps sending until gsm0_receive() writes past gsm-\u003ebuf\n Reason: Neither gsm-\u003estate nor gsm-\u003elen have been reset after\n reconfiguration.\n\nFix this by changing gsm-\u003ecount to gsm-\u003elen comparison from equal to less\nthan. Also add upper limit checks against the constant MAX_MRU in\ngsm0_receive() and gsm1_receive() to harden against memory corruption of\ngsm-\u003elen and gsm-\u003emru.\n\nAll other checks remain as we still need to limit the data according to the\nuser configuration and actual payload size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36016",
"url": "https://www.suse.com/security/cve/CVE-2024-36016"
},
{
"category": "external",
"summary": "SUSE Bug 1225642 for CVE-2024-36016",
"url": "https://bugzilla.suse.com/1225642"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36016"
},
{
"cve": "CVE-2024-36017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation\n\nEach attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a\nstruct ifla_vf_vlan_info so the size of such attribute needs to be at least\nof sizeof(struct ifla_vf_vlan_info) which is 14 bytes.\nThe current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes)\nwhich is less than sizeof(struct ifla_vf_vlan_info) so this validation\nis not enough and a too small attribute might be cast to a\nstruct ifla_vf_vlan_info, this might result in an out of bands\nread access when accessing the saved (casted) entry in ivvl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36017",
"url": "https://www.suse.com/security/cve/CVE-2024-36017"
},
{
"category": "external",
"summary": "SUSE Bug 1225681 for CVE-2024-36017",
"url": "https://bugzilla.suse.com/1225681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36017"
},
{
"cve": "CVE-2024-36025",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36025"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix off by one in qla_edif_app_getstats()\n\nThe app_reply-\u003eelem[] array is allocated earlier in this function and it\nhas app_req.num_ports elements. Thus this \u003e comparison needs to be \u003e= to\nprevent memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36025",
"url": "https://www.suse.com/security/cve/CVE-2024-36025"
},
{
"category": "external",
"summary": "SUSE Bug 1225704 for CVE-2024-36025",
"url": "https://bugzilla.suse.com/1225704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36025"
},
{
"cve": "CVE-2024-36479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36479"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: bridge: add owner module and take its refcount\n\nThe current implementation of the fpga bridge assumes that the low-level\nmodule registers a driver for the parent device and uses its owner pointer\nto take the module\u0027s refcount. This approach is problematic since it can\nlead to a null pointer dereference while attempting to get the bridge if\nthe parent device does not have a driver.\n\nTo address this problem, add a module owner pointer to the fpga_bridge\nstruct and use it to take the module\u0027s refcount. Modify the function for\nregistering a bridge to take an additional owner module parameter and\nrename it to avoid conflicts. Use the old function name for a helper macro\nthat automatically sets the module that registers the bridge as the owner.\nThis ensures compatibility with existing low-level control modules and\nreduces the chances of registering a bridge without setting the owner.\n\nAlso, update the documentation to keep it consistent with the new interface\nfor registering an fpga bridge.\n\nOther changes: opportunistically move put_device() from __fpga_bridge_get()\nto fpga_bridge_get() and of_fpga_bridge_get() to improve code clarity since\nthe bridge device is taken in these functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36479",
"url": "https://www.suse.com/security/cve/CVE-2024-36479"
},
{
"category": "external",
"summary": "SUSE Bug 1226949 for CVE-2024-36479",
"url": "https://bugzilla.suse.com/1226949"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36479"
},
{
"cve": "CVE-2024-36880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36880"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: qca: add missing firmware sanity checks\n\nAdd the missing sanity checks when parsing the firmware files before\ndownloading them to avoid accessing and corrupting memory beyond the\nvmalloced buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36880",
"url": "https://www.suse.com/security/cve/CVE-2024-36880"
},
{
"category": "external",
"summary": "SUSE Bug 1225722 for CVE-2024-36880",
"url": "https://bugzilla.suse.com/1225722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36880"
},
{
"cve": "CVE-2024-36894",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36894"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete\n\nFFS based applications can utilize the aio_cancel() callback to dequeue\npending USB requests submitted to the UDC. There is a scenario where the\nFFS application issues an AIO cancel call, while the UDC is handling a\nsoft disconnect. For a DWC3 based implementation, the callstack looks\nlike the following:\n\n DWC3 Gadget FFS Application\ndwc3_gadget_soft_disconnect() ...\n --\u003e dwc3_stop_active_transfers()\n --\u003e dwc3_gadget_giveback(-ESHUTDOWN)\n --\u003e ffs_epfile_async_io_complete() ffs_aio_cancel()\n --\u003e usb_ep_free_request() --\u003e usb_ep_dequeue()\n\nThere is currently no locking implemented between the AIO completion\nhandler and AIO cancel, so the issue occurs if the completion routine is\nrunning in parallel to an AIO cancel call coming from the FFS application.\nAs the completion call frees the USB request (io_data-\u003ereq) the FFS\napplication is also referencing it for the usb_ep_dequeue() call. This can\nlead to accessing a stale/hanging pointer.\n\ncommit b566d38857fc (\"usb: gadget: f_fs: use io_data-\u003estatus consistently\")\nrelocated the usb_ep_free_request() into ffs_epfile_async_io_complete().\nHowever, in order to properly implement locking to mitigate this issue, the\nspinlock can\u0027t be added to ffs_epfile_async_io_complete(), as\nusb_ep_dequeue() (if successfully dequeuing a USB request) will call the\nfunction driver\u0027s completion handler in the same context. Hence, leading\ninto a deadlock.\n\nFix this issue by moving the usb_ep_free_request() back to\nffs_user_copy_worker(), and ensuring that it explicitly sets io_data-\u003ereq\nto NULL after freeing it within the ffs-\u003eeps_lock. This resolves the race\ncondition above, as the ffs_aio_cancel() routine will not continue\nattempting to dequeue a request that has already been freed, or the\nffs_user_copy_work() not freeing the USB request until the AIO cancel is\ndone referencing it.\n\nThis fix depends on\n commit b566d38857fc (\"usb: gadget: f_fs: use io_data-\u003estatus\n consistently\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36894",
"url": "https://www.suse.com/security/cve/CVE-2024-36894"
},
{
"category": "external",
"summary": "SUSE Bug 1225749 for CVE-2024-36894",
"url": "https://bugzilla.suse.com/1225749"
},
{
"category": "external",
"summary": "SUSE Bug 1226139 for CVE-2024-36894",
"url": "https://bugzilla.suse.com/1226139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36894"
},
{
"cve": "CVE-2024-36915",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36915"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: llcp: fix nfc_llcp_setsockopt() unsafe copies\n\nsyzbot reported unsafe calls to copy_from_sockptr() [1]\n\nUse copy_safe_from_sockptr() instead.\n\n[1]\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]\n BUG: KASAN: slab-out-of-bounds in nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255\nRead of size 4 at addr ffff88801caa1ec3 by task syz-executor459/5078\n\nCPU: 0 PID: 5078 Comm: syz-executor459 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n copy_from_sockptr include/linux/sockptr.h:55 [inline]\n nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255\n do_sock_setsockopt+0x3b1/0x720 net/socket.c:2311\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfd/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\nRIP: 0033:0x7f7fac07fd89\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff660eb788 EFLAGS: 00000246 ORIG_RAX: 0000000000000036\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7fac07fd89\nRDX: 0000000000000000 RSI: 0000000000000118 RDI: 0000000000000004\nRBP: 0000000000000000 R08: 0000000000000002 R09: 0000000000000000\nR10: 0000000020000a80 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36915",
"url": "https://www.suse.com/security/cve/CVE-2024-36915"
},
{
"category": "external",
"summary": "SUSE Bug 1225758 for CVE-2024-36915",
"url": "https://bugzilla.suse.com/1225758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36915"
},
{
"cve": "CVE-2024-36917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix overflow in blk_ioctl_discard()\n\nThere is no check for overflow of \u0027start + len\u0027 in blk_ioctl_discard().\nHung task occurs if submit an discard ioctl with the following param:\n start = 0x80000000000ff000, len = 0x8000000000fff000;\nAdd the overflow validation now.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36917",
"url": "https://www.suse.com/security/cve/CVE-2024-36917"
},
{
"category": "external",
"summary": "SUSE Bug 1225770 for CVE-2024-36917",
"url": "https://bugzilla.suse.com/1225770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36917"
},
{
"cve": "CVE-2024-36919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36919"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload\n\nThe session resources are used by FW and driver when session is offloaded,\nonce session is uploaded these resources are not used. The lock is not\nrequired as these fields won\u0027t be used any longer. The offload and upload\ncalls are sequential, hence lock is not required.\n\nThis will suppress following BUG_ON():\n\n[ 449.843143] ------------[ cut here ]------------\n[ 449.848302] kernel BUG at mm/vmalloc.c:2727!\n[ 449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[ 449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1\nRebooting.\n[ 449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016\n[ 449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]\n[ 449.882910] RIP: 0010:vunmap+0x2e/0x30\n[ 449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 \u003c0f\u003e 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41\n[ 449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206\n[ 449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005\n[ 449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000\n[ 449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf\n[ 449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000\n[ 449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0\n[ 449.953701] FS: 0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000\n[ 449.962732] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0\n[ 449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 449.993028] Call Trace:\n[ 449.995756] __iommu_dma_free+0x96/0x100\n[ 450.000139] bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]\n[ 450.006171] bnx2fc_upload_session+0xce/0x100 [bnx2fc]\n[ 450.011910] bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]\n[ 450.018136] fc_rport_work+0x103/0x5b0 [libfc]\n[ 450.023103] process_one_work+0x1e8/0x3c0\n[ 450.027581] worker_thread+0x50/0x3b0\n[ 450.031669] ? rescuer_thread+0x370/0x370\n[ 450.036143] kthread+0x149/0x170\n[ 450.039744] ? set_kthread_struct+0x40/0x40\n[ 450.044411] ret_from_fork+0x22/0x30\n[ 450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls\n[ 450.048497] libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler\n[ 450.159753] ---[ end trace 712de2c57c64abc8 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36919",
"url": "https://www.suse.com/security/cve/CVE-2024-36919"
},
{
"category": "external",
"summary": "SUSE Bug 1225767 for CVE-2024-36919",
"url": "https://bugzilla.suse.com/1225767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36919"
},
{
"cve": "CVE-2024-36923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: fix uninitialized values during inode evict\n\nIf an iget fails due to not being able to retrieve information\nfrom the server then the inode structure is only partially\ninitialized. When the inode gets evicted, references to\nuninitialized structures (like fscache cookies) were being\nmade.\n\nThis patch checks for a bad_inode before doing anything other\nthan clearing the inode from the cache. Since the inode is\nbad, it shouldn\u0027t have any state associated with it that needs\nto be written back (and there really isn\u0027t a way to complete\nthose anyways).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36923",
"url": "https://www.suse.com/security/cve/CVE-2024-36923"
},
{
"category": "external",
"summary": "SUSE Bug 1225815 for CVE-2024-36923",
"url": "https://bugzilla.suse.com/1225815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36923"
},
{
"cve": "CVE-2024-36934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbna: ensure the copied buf is NUL terminated\n\nCurrently, we allocate a nbytes-sized kernel buffer and copy nbytes from\nuserspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t\nensure that the string is terminated inside the buffer, this can lead to\nOOB read when using sscanf. Fix this issue by using memdup_user_nul\ninstead of memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36934",
"url": "https://www.suse.com/security/cve/CVE-2024-36934"
},
{
"category": "external",
"summary": "SUSE Bug 1225760 for CVE-2024-36934",
"url": "https://bugzilla.suse.com/1225760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36934"
},
{
"cve": "CVE-2024-36938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36938"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue\n\nFix NULL pointer data-races in sk_psock_skb_ingress_enqueue() which\nsyzbot reported [1].\n\n[1]\nBUG: KCSAN: data-race in sk_psock_drop / sk_psock_skb_ingress_enqueue\n\nwrite to 0xffff88814b3278b8 of 8 bytes by task 10724 on cpu 1:\n sk_psock_stop_verdict net/core/skmsg.c:1257 [inline]\n sk_psock_drop+0x13e/0x1f0 net/core/skmsg.c:843\n sk_psock_put include/linux/skmsg.h:459 [inline]\n sock_map_close+0x1a7/0x260 net/core/sock_map.c:1648\n unix_release+0x4b/0x80 net/unix/af_unix.c:1048\n __sock_release net/socket.c:659 [inline]\n sock_close+0x68/0x150 net/socket.c:1421\n __fput+0x2c1/0x660 fs/file_table.c:422\n __fput_sync+0x44/0x60 fs/file_table.c:507\n __do_sys_close fs/open.c:1556 [inline]\n __se_sys_close+0x101/0x1b0 fs/open.c:1541\n __x64_sys_close+0x1f/0x30 fs/open.c:1541\n do_syscall_64+0xd3/0x1d0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nread to 0xffff88814b3278b8 of 8 bytes by task 10713 on cpu 0:\n sk_psock_data_ready include/linux/skmsg.h:464 [inline]\n sk_psock_skb_ingress_enqueue+0x32d/0x390 net/core/skmsg.c:555\n sk_psock_skb_ingress_self+0x185/0x1e0 net/core/skmsg.c:606\n sk_psock_verdict_apply net/core/skmsg.c:1008 [inline]\n sk_psock_verdict_recv+0x3e4/0x4a0 net/core/skmsg.c:1202\n unix_read_skb net/unix/af_unix.c:2546 [inline]\n unix_stream_read_skb+0x9e/0xf0 net/unix/af_unix.c:2682\n sk_psock_verdict_data_ready+0x77/0x220 net/core/skmsg.c:1223\n unix_stream_sendmsg+0x527/0x860 net/unix/af_unix.c:2339\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x140/0x180 net/socket.c:745\n ____sys_sendmsg+0x312/0x410 net/socket.c:2584\n ___sys_sendmsg net/socket.c:2638 [inline]\n __sys_sendmsg+0x1e9/0x280 net/socket.c:2667\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x46/0x50 net/socket.c:2674\n do_syscall_64+0xd3/0x1d0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nvalue changed: 0xffffffff83d7feb0 -\u003e 0x0000000000000000\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 10713 Comm: syz-executor.4 Tainted: G W 6.8.0-syzkaller-08951-gfe46a7dd189e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\n\nPrior to this, commit 4cd12c6065df (\"bpf, sockmap: Fix NULL pointer\ndereference in sk_psock_verdict_data_ready()\") fixed one NULL pointer\nsimilarly due to no protection of saved_data_ready. Here is another\ndifferent caller causing the same issue because of the same reason. So\nwe should protect it with sk_callback_lock read lock because the writer\nside in the sk_psock_drop() uses \"write_lock_bh(\u0026sk-\u003esk_callback_lock);\".\n\nTo avoid errors that could happen in future, I move those two pairs of\nlock into the sk_psock_data_ready(), which is suggested by John Fastabend.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36938",
"url": "https://www.suse.com/security/cve/CVE-2024-36938"
},
{
"category": "external",
"summary": "SUSE Bug 1225761 for CVE-2024-36938",
"url": "https://bugzilla.suse.com/1225761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36938"
},
{
"cve": "CVE-2024-36940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36940"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: core: delete incorrect free in pinctrl_enable()\n\nThe \"pctldev\" struct is allocated in devm_pinctrl_register_and_init().\nIt\u0027s a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),\nso freeing it in pinctrl_enable() will lead to a double free.\n\nThe devm_pinctrl_dev_release() function frees the pindescs and destroys\nthe mutex as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36940",
"url": "https://www.suse.com/security/cve/CVE-2024-36940"
},
{
"category": "external",
"summary": "SUSE Bug 1225840 for CVE-2024-36940",
"url": "https://bugzilla.suse.com/1225840"
},
{
"category": "external",
"summary": "SUSE Bug 1225841 for CVE-2024-36940",
"url": "https://bugzilla.suse.com/1225841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36941"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: don\u0027t free NULL coalescing rule\n\nIf the parsing fails, we can dereference a NULL pointer here.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36941",
"url": "https://www.suse.com/security/cve/CVE-2024-36941"
},
{
"category": "external",
"summary": "SUSE Bug 1225835 for CVE-2024-36941",
"url": "https://bugzilla.suse.com/1225835"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36941"
},
{
"cve": "CVE-2024-36949",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36949"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\namd/amdkfd: sync all devices to wait all processes being evicted\n\nIf there are more than one device doing reset in parallel, the first\ndevice will call kfd_suspend_all_processes() to evict all processes\non all devices, this call takes time to finish. other device will\nstart reset and recover without waiting. if the process has not been\nevicted before doing recover, it will be restored, then caused page\nfault.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36949",
"url": "https://www.suse.com/security/cve/CVE-2024-36949"
},
{
"category": "external",
"summary": "SUSE Bug 1225894 for CVE-2024-36949",
"url": "https://bugzilla.suse.com/1225894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36949"
},
{
"cve": "CVE-2024-36950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36950"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: ohci: mask bus reset interrupts between ISR and bottom half\n\nIn the FireWire OHCI interrupt handler, if a bus reset interrupt has\noccurred, mask bus reset interrupts until bus_reset_work has serviced and\ncleared the interrupt.\n\nNormally, we always leave bus reset interrupts masked. We infer the bus\nreset from the self-ID interrupt that happens shortly thereafter. A\nscenario where we unmask bus reset interrupts was introduced in 2008 in\na007bb857e0b26f5d8b73c2ff90782d9c0972620: If\nOHCI_PARAM_DEBUG_BUSRESETS (8) is set in the debug parameter bitmask, we\nwill unmask bus reset interrupts so we can log them.\n\nirq_handler logs the bus reset interrupt. However, we can\u0027t clear the bus\nreset event flag in irq_handler, because we won\u0027t service the event until\nlater. irq_handler exits with the event flag still set. If the\ncorresponding interrupt is still unmasked, the first bus reset will\nusually freeze the system due to irq_handler being called again each\ntime it exits. This freeze can be reproduced by loading firewire_ohci\nwith \"modprobe firewire_ohci debug=-1\" (to enable all debugging output).\nApparently there are also some cases where bus_reset_work will get called\nsoon enough to clear the event, and operation will continue normally.\n\nThis freeze was first reported a few months after a007bb85 was committed,\nbut until now it was never fixed. The debug level could safely be set\nto -1 through sysfs after the module was loaded, but this would be\nineffectual in logging bus reset interrupts since they were only\nunmasked during initialization.\n\nirq_handler will now leave the event flag set but mask bus reset\ninterrupts, so irq_handler won\u0027t be called again and there will be no\nfreeze. If OHCI_PARAM_DEBUG_BUSRESETS is enabled, bus_reset_work will\nunmask the interrupt after servicing the event, so future interrupts\nwill be caught as desired.\n\nAs a side effect to this change, OHCI_PARAM_DEBUG_BUSRESETS can now be\nenabled through sysfs in addition to during initial module loading.\nHowever, when enabled through sysfs, logging of bus reset interrupts will\nbe effective only starting with the second bus reset, after\nbus_reset_work has executed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36950",
"url": "https://www.suse.com/security/cve/CVE-2024-36950"
},
{
"category": "external",
"summary": "SUSE Bug 1225895 for CVE-2024-36950",
"url": "https://bugzilla.suse.com/1225895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36950"
},
{
"cve": "CVE-2024-36952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36952"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Move NPIV\u0027s transport unregistration to after resource clean up\n\nThere are cases after NPIV deletion where the fabric switch still believes\nthe NPIV is logged into the fabric. This occurs when a vport is\nunregistered before the Remove All DA_ID CT and LOGO ELS are sent to the\nfabric.\n\nCurrently fc_remove_host(), which calls dev_loss_tmo for all D_IDs including\nthe fabric D_ID, removes the last ndlp reference and frees the ndlp rport\nobject. This sometimes causes the race condition where the final DA_ID and\nLOGO are skipped from being sent to the fabric switch.\n\nFix by moving the fc_remove_host() and scsi_remove_host() calls after DA_ID\nand LOGO are sent.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36952",
"url": "https://www.suse.com/security/cve/CVE-2024-36952"
},
{
"category": "external",
"summary": "SUSE Bug 1225898 for CVE-2024-36952",
"url": "https://bugzilla.suse.com/1225898"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36952"
},
{
"cve": "CVE-2024-36960",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36960"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix invalid reads in fence signaled events\n\nCorrectly set the length of the drm_event to the size of the structure\nthat\u0027s actually used.\n\nThe length of the drm_event was set to the parent structure instead of\nto the drm_vmw_event_fence which is supposed to be read. drm_read\nuses the length parameter to copy the event to the user space thus\nresuling in oob reads.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36960",
"url": "https://www.suse.com/security/cve/CVE-2024-36960"
},
{
"category": "external",
"summary": "SUSE Bug 1225872 for CVE-2024-36960",
"url": "https://bugzilla.suse.com/1225872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-36960"
},
{
"cve": "CVE-2024-36964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000\u0027s perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36964",
"url": "https://www.suse.com/security/cve/CVE-2024-36964"
},
{
"category": "external",
"summary": "SUSE Bug 1225866 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "external",
"summary": "SUSE Bug 1226325 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1226325"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "important"
}
],
"title": "CVE-2024-36964"
},
{
"cve": "CVE-2024-37021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: manager: add owner module and take its refcount\n\nThe current implementation of the fpga manager assumes that the low-level\nmodule registers a driver for the parent device and uses its owner pointer\nto take the module\u0027s refcount. This approach is problematic since it can\nlead to a null pointer dereference while attempting to get the manager if\nthe parent device does not have a driver.\n\nTo address this problem, add a module owner pointer to the fpga_manager\nstruct and use it to take the module\u0027s refcount. Modify the functions for\nregistering the manager to take an additional owner module parameter and\nrename them to avoid conflicts. Use the old function names for helper\nmacros that automatically set the module that registers the manager as the\nowner. This ensures compatibility with existing low-level control modules\nand reduces the chances of registering a manager without setting the owner.\n\nAlso, update the documentation to keep it consistent with the new interface\nfor registering an fpga manager.\n\nOther changes: opportunistically move put_device() from __fpga_mgr_get() to\nfpga_mgr_get() and of_fpga_mgr_get() to improve code clarity since the\nmanager device is taken in these functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37021",
"url": "https://www.suse.com/security/cve/CVE-2024-37021"
},
{
"category": "external",
"summary": "SUSE Bug 1226950 for CVE-2024-37021",
"url": "https://bugzilla.suse.com/1226950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-37021"
},
{
"cve": "CVE-2024-37354",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37354"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix crash on racing fsync and size-extending write into prealloc\n\nWe have been seeing crashes on duplicate keys in\nbtrfs_set_item_key_safe():\n\n BTRFS critical (device vdb): slot 4 key (450 108 8192) new key (450 108 8192)\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/ctree.c:2620!\n invalid opcode: 0000 [#1] PREEMPT SMP PTI\n CPU: 0 PID: 3139 Comm: xfs_io Kdump: loaded Not tainted 6.9.0 #6\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014\n RIP: 0010:btrfs_set_item_key_safe+0x11f/0x290 [btrfs]\n\nWith the following stack trace:\n\n #0 btrfs_set_item_key_safe (fs/btrfs/ctree.c:2620:4)\n #1 btrfs_drop_extents (fs/btrfs/file.c:411:4)\n #2 log_one_extent (fs/btrfs/tree-log.c:4732:9)\n #3 btrfs_log_changed_extents (fs/btrfs/tree-log.c:4955:9)\n #4 btrfs_log_inode (fs/btrfs/tree-log.c:6626:9)\n #5 btrfs_log_inode_parent (fs/btrfs/tree-log.c:7070:8)\n #6 btrfs_log_dentry_safe (fs/btrfs/tree-log.c:7171:8)\n #7 btrfs_sync_file (fs/btrfs/file.c:1933:8)\n #8 vfs_fsync_range (fs/sync.c:188:9)\n #9 vfs_fsync (fs/sync.c:202:9)\n #10 do_fsync (fs/sync.c:212:9)\n #11 __do_sys_fdatasync (fs/sync.c:225:9)\n #12 __se_sys_fdatasync (fs/sync.c:223:1)\n #13 __x64_sys_fdatasync (fs/sync.c:223:1)\n #14 do_syscall_x64 (arch/x86/entry/common.c:52:14)\n #15 do_syscall_64 (arch/x86/entry/common.c:83:7)\n #16 entry_SYSCALL_64+0xaf/0x14c (arch/x86/entry/entry_64.S:121)\n\nSo we\u0027re logging a changed extent from fsync, which is splitting an\nextent in the log tree. But this split part already exists in the tree,\ntriggering the BUG().\n\nThis is the state of the log tree at the time of the crash, dumped with\ndrgn (https://github.com/osandov/drgn/blob/main/contrib/btrfs_tree.py)\nto get more details than btrfs_print_leaf() gives us:\n\n \u003e\u003e\u003e print_extent_buffer(prog.crashed_thread().stack_trace()[0][\"eb\"])\n leaf 33439744 level 0 items 72 generation 9 owner 18446744073709551610\n leaf 33439744 flags 0x100000000000000\n fs uuid e5bd3946-400c-4223-8923-190ef1f18677\n chunk uuid d58cb17e-6d02-494a-829a-18b7d8a399da\n item 0 key (450 INODE_ITEM 0) itemoff 16123 itemsize 160\n generation 7 transid 9 size 8192 nbytes 8473563889606862198\n block group 0 mode 100600 links 1 uid 0 gid 0 rdev 0\n sequence 204 flags 0x10(PREALLOC)\n atime 1716417703.220000000 (2024-05-22 15:41:43)\n ctime 1716417704.983333333 (2024-05-22 15:41:44)\n mtime 1716417704.983333333 (2024-05-22 15:41:44)\n otime 17592186044416.000000000 (559444-03-08 01:40:16)\n item 1 key (450 INODE_REF 256) itemoff 16110 itemsize 13\n index 195 namelen 3 name: 193\n item 2 key (450 XATTR_ITEM 1640047104) itemoff 16073 itemsize 37\n location key (0 UNKNOWN.0 0) type XATTR\n transid 7 data_len 1 name_len 6\n name: user.a\n data a\n item 3 key (450 EXTENT_DATA 0) itemoff 16020 itemsize 53\n generation 9 type 1 (regular)\n extent data disk byte 303144960 nr 12288\n extent data offset 0 nr 4096 ram 12288\n extent compression 0 (none)\n item 4 key (450 EXTENT_DATA 4096) itemoff 15967 itemsize 53\n generation 9 type 2 (prealloc)\n prealloc data disk byte 303144960 nr 12288\n prealloc data offset 4096 nr 8192\n item 5 key (450 EXTENT_DATA 8192) itemoff 15914 itemsize 53\n generation 9 type 2 (prealloc)\n prealloc data disk byte 303144960 nr 12288\n prealloc data offset 8192 nr 4096\n ...\n\nSo the real problem happened earlier: notice that items 4 (4k-12k) and 5\n(8k-12k) overlap. Both are prealloc extents. Item 4 straddles i_size and\nitem 5 starts at i_size.\n\nHere is the state of \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37354",
"url": "https://www.suse.com/security/cve/CVE-2024-37354"
},
{
"category": "external",
"summary": "SUSE Bug 1227101 for CVE-2024-37354",
"url": "https://bugzilla.suse.com/1227101"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-37354"
},
{
"cve": "CVE-2024-38544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38544"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix seg fault in rxe_comp_queue_pkt\n\nIn rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the\nresp_pkts queue and then a decision is made whether to run the completer\ntask inline or schedule it. Finally the skb is dereferenced to bump a \u0027hw\u0027\nperformance counter. This is wrong because if the completer task is\nalready running in a separate thread it may have already processed the skb\nand freed it which can cause a seg fault. This has been observed\ninfrequently in testing at high scale.\n\nThis patch fixes this by changing the order of enqueuing the packet until\nafter the counter is accessed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38544",
"url": "https://www.suse.com/security/cve/CVE-2024-38544"
},
{
"category": "external",
"summary": "SUSE Bug 1226597 for CVE-2024-38544",
"url": "https://bugzilla.suse.com/1226597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38544"
},
{
"cve": "CVE-2024-38545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38545"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix UAF for cq async event\n\nThe refcount of CQ is not protected by locks. When CQ asynchronous\nevents and CQ destruction are concurrent, CQ may have been released,\nwhich will cause UAF.\n\nUse the xa_lock() to protect the CQ refcount.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38545",
"url": "https://www.suse.com/security/cve/CVE-2024-38545"
},
{
"category": "external",
"summary": "SUSE Bug 1226595 for CVE-2024-38545",
"url": "https://bugzilla.suse.com/1226595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38545"
},
{
"cve": "CVE-2024-38546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38546"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: vc4: Fix possible null pointer dereference\n\nIn vc4_hdmi_audio_init() of_get_address() may return\nNULL which is later dereferenced. Fix this bug by adding NULL check.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38546",
"url": "https://www.suse.com/security/cve/CVE-2024-38546"
},
{
"category": "external",
"summary": "SUSE Bug 1226593 for CVE-2024-38546",
"url": "https://bugzilla.suse.com/1226593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38546"
},
{
"cve": "CVE-2024-38549",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38549"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Add 0 size check to mtk_drm_gem_obj\n\nAdd a check to mtk_drm_gem_init if we attempt to allocate a GEM object\nof 0 bytes. Currently, no such check exists and the kernel will panic if\na userspace application attempts to allocate a 0x0 GBM buffer.\n\nTested by attempting to allocate a 0x0 GBM buffer on an MT8188 and\nverifying that we now return EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38549",
"url": "https://www.suse.com/security/cve/CVE-2024-38549"
},
{
"category": "external",
"summary": "SUSE Bug 1226735 for CVE-2024-38549",
"url": "https://bugzilla.suse.com/1226735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38549"
},
{
"cve": "CVE-2024-38552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38552"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix potential index out of bounds in color transformation function\n\nFixes index out of bounds issue in the color transformation function.\nThe issue could occur when the index \u0027i\u0027 exceeds the number of transfer\nfunction points (TRANSFER_FUNC_POINTS).\n\nThe fix adds a check to ensure \u0027i\u0027 is within bounds before accessing the\ntransfer function points. If \u0027i\u0027 is out of bounds, an error message is\nlogged and the function returns false to indicate an error.\n\nReported by smatch:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:405 cm_helper_translate_curve_to_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.red\u0027 1025 \u003c= s32max\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:406 cm_helper_translate_curve_to_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.green\u0027 1025 \u003c= s32max\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:407 cm_helper_translate_curve_to_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.blue\u0027 1025 \u003c= s32max",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38552",
"url": "https://www.suse.com/security/cve/CVE-2024-38552"
},
{
"category": "external",
"summary": "SUSE Bug 1226767 for CVE-2024-38552",
"url": "https://bugzilla.suse.com/1226767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38552"
},
{
"cve": "CVE-2024-38553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38553"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fec: remove .ndo_poll_controller to avoid deadlocks\n\nThere is a deadlock issue found in sungem driver, please refer to the\ncommit ac0a230f719b (\"eth: sungem: remove .ndo_poll_controller to avoid\ndeadlocks\"). The root cause of the issue is that netpoll is in atomic\ncontext and disable_irq() is called by .ndo_poll_controller interface\nof sungem driver, however, disable_irq() might sleep. After analyzing\nthe implementation of fec_poll_controller(), the fec driver should have\nthe same issue. Due to the fec driver uses NAPI for TX completions, the\n.ndo_poll_controller is unnecessary to be implemented in the fec driver,\nso fec_poll_controller() can be safely removed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38553",
"url": "https://www.suse.com/security/cve/CVE-2024-38553"
},
{
"category": "external",
"summary": "SUSE Bug 1226744 for CVE-2024-38553",
"url": "https://bugzilla.suse.com/1226744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38553"
},
{
"cve": "CVE-2024-38565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38565"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ar5523: enable proper endpoint verification\n\nSyzkaller reports [1] hitting a warning about an endpoint in use\nnot having an expected type to it.\n\nFix the issue by checking for the existence of all proper\nendpoints with their according types intact.\n\nSadly, this patch has not been tested on real hardware.\n\n[1] Syzkaller report:\n------------[ cut here ]------------\nusb 1-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 0 PID: 3643 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\n...\nCall Trace:\n \u003cTASK\u003e\n ar5523_cmd+0x41b/0x780 drivers/net/wireless/ath/ar5523/ar5523.c:275\n ar5523_cmd_read drivers/net/wireless/ath/ar5523/ar5523.c:302 [inline]\n ar5523_host_available drivers/net/wireless/ath/ar5523/ar5523.c:1376 [inline]\n ar5523_probe+0x14b0/0x1d10 drivers/net/wireless/ath/ar5523/ar5523.c:1655\n usb_probe_interface+0x30f/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:560 [inline]\n really_probe+0x249/0xb90 drivers/base/dd.c:639\n __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808\n __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936\n bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427\n __device_attach+0x1e4/0x530 drivers/base/dd.c:1008\n bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487\n device_add+0xbd9/0x1e90 drivers/base/core.c:3517\n usb_set_configuration+0x101d/0x1900 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xbe/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd8/0x2c0 drivers/usb/core/driver.c:293\n call_driver_probe drivers/base/dd.c:560 [inline]\n really_probe+0x249/0xb90 drivers/base/dd.c:639\n __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808\n __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936\n bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427\n __device_attach+0x1e4/0x530 drivers/base/dd.c:1008\n bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487\n device_add+0xbd9/0x1e90 drivers/base/core.c:3517\n usb_new_device.cold+0x685/0x10ad drivers/usb/core/hub.c:2573\n hub_port_connect drivers/usb/core/hub.c:5353 [inline]\n hub_port_connect_change drivers/usb/core/hub.c:5497 [inline]\n port_event drivers/usb/core/hub.c:5653 [inline]\n hub_event+0x26cb/0x45d0 drivers/usb/core/hub.c:5735\n process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\n worker_thread+0x669/0x1090 kernel/workqueue.c:2436\n kthread+0x2e8/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38565",
"url": "https://www.suse.com/security/cve/CVE-2024-38565"
},
{
"category": "external",
"summary": "SUSE Bug 1226747 for CVE-2024-38565",
"url": "https://bugzilla.suse.com/1226747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38565"
},
{
"cve": "CVE-2024-38567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38567"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: carl9170: add a proper sanity check for endpoints\n\nSyzkaller reports [1] hitting a warning which is caused by presence\nof a wrong endpoint type at the URB sumbitting stage. While there\nwas a check for a specific 4th endpoint, since it can switch types\nbetween bulk and interrupt, other endpoints are trusted implicitly.\nSimilar warning is triggered in a couple of other syzbot issues [2].\n\nFix the issue by doing a comprehensive check of all endpoints\ntaking into account difference between high- and full-speed\nconfiguration.\n\n[1] Syzkaller report:\n...\nWARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\n...\nCall Trace:\n \u003cTASK\u003e\n carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504\n carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]\n carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]\n carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028\n request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107\n process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\n worker_thread+0x669/0x1090 kernel/workqueue.c:2436\n kthread+0x2e8/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308\n \u003c/TASK\u003e\n\n[2] Related syzkaller crashes:",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38567",
"url": "https://www.suse.com/security/cve/CVE-2024-38567"
},
{
"category": "external",
"summary": "SUSE Bug 1226769 for CVE-2024-38567",
"url": "https://bugzilla.suse.com/1226769"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38567"
},
{
"cve": "CVE-2024-38578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38578"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\necryptfs: Fix buffer size for tag 66 packet\n\nThe \u0027TAG 66 Packet Format\u0027 description is missing the cipher code and\nchecksum fields that are packed into the message packet. As a result,\nthe buffer allocated for the packet is 3 bytes too small and\nwrite_tag_66_packet() will write up to 3 bytes past the end of the\nbuffer.\n\nFix this by increasing the size of the allocation so the whole packet\nwill always fit in the buffer.\n\nThis fixes the below kasan slab-out-of-bounds bug:\n\n BUG: KASAN: slab-out-of-bounds in ecryptfs_generate_key_packet_set+0x7d6/0xde0\n Write of size 1 at addr ffff88800afbb2a5 by task touch/181\n\n CPU: 0 PID: 181 Comm: touch Not tainted 6.6.13-gnu #1 4c9534092be820851bb687b82d1f92a426598dc6\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2/GNU Guix 04/01/2014\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4c/0x70\n print_report+0xc5/0x610\n ? ecryptfs_generate_key_packet_set+0x7d6/0xde0\n ? kasan_complete_mode_report_info+0x44/0x210\n ? ecryptfs_generate_key_packet_set+0x7d6/0xde0\n kasan_report+0xc2/0x110\n ? ecryptfs_generate_key_packet_set+0x7d6/0xde0\n __asan_store1+0x62/0x80\n ecryptfs_generate_key_packet_set+0x7d6/0xde0\n ? __pfx_ecryptfs_generate_key_packet_set+0x10/0x10\n ? __alloc_pages+0x2e2/0x540\n ? __pfx_ovl_open+0x10/0x10 [overlay 30837f11141636a8e1793533a02e6e2e885dad1d]\n ? dentry_open+0x8f/0xd0\n ecryptfs_write_metadata+0x30a/0x550\n ? __pfx_ecryptfs_write_metadata+0x10/0x10\n ? ecryptfs_get_lower_file+0x6b/0x190\n ecryptfs_initialize_file+0x77/0x150\n ecryptfs_create+0x1c2/0x2f0\n path_openat+0x17cf/0x1ba0\n ? __pfx_path_openat+0x10/0x10\n do_filp_open+0x15e/0x290\n ? __pfx_do_filp_open+0x10/0x10\n ? __kasan_check_write+0x18/0x30\n ? _raw_spin_lock+0x86/0xf0\n ? __pfx__raw_spin_lock+0x10/0x10\n ? __kasan_check_write+0x18/0x30\n ? alloc_fd+0xf4/0x330\n do_sys_openat2+0x122/0x160\n ? __pfx_do_sys_openat2+0x10/0x10\n __x64_sys_openat+0xef/0x170\n ? __pfx___x64_sys_openat+0x10/0x10\n do_syscall_64+0x60/0xd0\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n RIP: 0033:0x7f00a703fd67\n Code: 25 00 00 41 00 3d 00 00 41 00 74 37 64 8b 04 25 18 00 00 00 85 c0 75 5b 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 0f 87 85 00 00 00 48 83 c4 68 5d 41 5c c3 0f 1f\n RSP: 002b:00007ffc088e30b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101\n RAX: ffffffffffffffda RBX: 00007ffc088e3368 RCX: 00007f00a703fd67\n RDX: 0000000000000941 RSI: 00007ffc088e48d7 RDI: 00000000ffffff9c\n RBP: 00007ffc088e48d7 R08: 0000000000000001 R09: 0000000000000000\n R10: 00000000000001b6 R11: 0000000000000246 R12: 0000000000000941\n R13: 0000000000000000 R14: 00007ffc088e48d7 R15: 00007f00a7180040\n \u003c/TASK\u003e\n\n Allocated by task 181:\n kasan_save_stack+0x2f/0x60\n kasan_set_track+0x29/0x40\n kasan_save_alloc_info+0x25/0x40\n __kasan_kmalloc+0xc5/0xd0\n __kmalloc+0x66/0x160\n ecryptfs_generate_key_packet_set+0x6d2/0xde0\n ecryptfs_write_metadata+0x30a/0x550\n ecryptfs_initialize_file+0x77/0x150\n ecryptfs_create+0x1c2/0x2f0\n path_openat+0x17cf/0x1ba0\n do_filp_open+0x15e/0x290\n do_sys_openat2+0x122/0x160\n __x64_sys_openat+0xef/0x170\n do_syscall_64+0x60/0xd0\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38578",
"url": "https://www.suse.com/security/cve/CVE-2024-38578"
},
{
"category": "external",
"summary": "SUSE Bug 1226634 for CVE-2024-38578",
"url": "https://bugzilla.suse.com/1226634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38578"
},
{
"cve": "CVE-2024-38579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38579"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: bcm - Fix pointer arithmetic\n\nIn spu2_dump_omd() value of ptr is increased by ciph_key_len\ninstead of hash_iv_len which could lead to going beyond the\nbuffer boundaries.\nFix this bug by changing ciph_key_len to hash_iv_len.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38579",
"url": "https://www.suse.com/security/cve/CVE-2024-38579"
},
{
"category": "external",
"summary": "SUSE Bug 1226637 for CVE-2024-38579",
"url": "https://bugzilla.suse.com/1226637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38579"
},
{
"cve": "CVE-2024-38580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38580"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nepoll: be better about file lifetimes\n\nepoll can call out to vfs_poll() with a file pointer that may race with\nthe last \u0027fput()\u0027. That would make f_count go down to zero, and while\nthe ep-\u003emtx locking means that the resulting file pointer tear-down will\nbe blocked until the poll returns, it means that f_count is already\ndead, and any use of it won\u0027t actually get a reference to the file any\nmore: it\u0027s dead regardless.\n\nMake sure we have a valid ref on the file pointer before we call down to\nvfs_poll() from the epoll routines.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38580",
"url": "https://www.suse.com/security/cve/CVE-2024-38580"
},
{
"category": "external",
"summary": "SUSE Bug 1226610 for CVE-2024-38580",
"url": "https://bugzilla.suse.com/1226610"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38580"
},
{
"cve": "CVE-2024-38597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38597"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: sungem: remove .ndo_poll_controller to avoid deadlocks\n\nErhard reports netpoll warnings from sungem:\n\n netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398)\n WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c\n\ngem_poll_controller() disables interrupts, which may sleep.\nWe can\u0027t sleep in netpoll, it has interrupts disabled completely.\nStrangely, gem_poll_controller() doesn\u0027t even poll the completions,\nand instead acts as if an interrupt has fired so it just schedules\nNAPI and exits. None of this has been necessary for years, since\nnetpoll invokes NAPI directly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38597",
"url": "https://www.suse.com/security/cve/CVE-2024-38597"
},
{
"category": "external",
"summary": "SUSE Bug 1226749 for CVE-2024-38597",
"url": "https://bugzilla.suse.com/1226749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38597"
},
{
"cve": "CVE-2024-38598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38598"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: fix resync softlockup when bitmap size is less than array size\n\nIs is reported that for dm-raid10, lvextend + lvchange --syncaction will\ntrigger following softlockup:\n\nkernel:watchdog: BUG: soft lockup - CPU#3 stuck for 26s! [mdX_resync:6976]\nCPU: 7 PID: 3588 Comm: mdX_resync Kdump: loaded Not tainted 6.9.0-rc4-next-20240419 #1\nRIP: 0010:_raw_spin_unlock_irq+0x13/0x30\nCall Trace:\n \u003cTASK\u003e\n md_bitmap_start_sync+0x6b/0xf0\n raid10_sync_request+0x25c/0x1b40 [raid10]\n md_do_sync+0x64b/0x1020\n md_thread+0xa7/0x170\n kthread+0xcf/0x100\n ret_from_fork+0x30/0x50\n ret_from_fork_asm+0x1a/0x30\n\nAnd the detailed process is as follows:\n\nmd_do_sync\n j = mddev-\u003eresync_min\n while (j \u003c max_sectors)\n sectors = raid10_sync_request(mddev, j, \u0026skipped)\n if (!md_bitmap_start_sync(..., \u0026sync_blocks))\n // md_bitmap_start_sync set sync_blocks to 0\n return sync_blocks + sectors_skippe;\n // sectors = 0;\n j += sectors;\n // j never change\n\nRoot cause is that commit 301867b1c168 (\"md/raid10: check\nslab-out-of-bounds in md_bitmap_get_counter\") return early from\nmd_bitmap_get_counter(), without setting returned blocks.\n\nFix this problem by always set returned blocks from\nmd_bitmap_get_counter\"(), as it used to be.\n\nNoted that this patch just fix the softlockup problem in kernel, the\ncase that bitmap size doesn\u0027t match array size still need to be fixed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38598",
"url": "https://www.suse.com/security/cve/CVE-2024-38598"
},
{
"category": "external",
"summary": "SUSE Bug 1226757 for CVE-2024-38598",
"url": "https://bugzilla.suse.com/1226757"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38598"
},
{
"cve": "CVE-2024-38601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38601"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Fix a race between readers and resize checks\n\nThe reader code in rb_get_reader_page() swaps a new reader page into the\nring buffer by doing cmpxchg on old-\u003elist.prev-\u003enext to point it to the\nnew page. Following that, if the operation is successful,\nold-\u003elist.next-\u003eprev gets updated too. This means the underlying\ndoubly-linked list is temporarily inconsistent, page-\u003eprev-\u003enext or\npage-\u003enext-\u003eprev might not be equal back to page for some page in the\nring buffer.\n\nThe resize operation in ring_buffer_resize() can be invoked in parallel.\nIt calls rb_check_pages() which can detect the described inconsistency\nand stop further tracing:\n\n[ 190.271762] ------------[ cut here ]------------\n[ 190.271771] WARNING: CPU: 1 PID: 6186 at kernel/trace/ring_buffer.c:1467 rb_check_pages.isra.0+0x6a/0xa0\n[ 190.271789] Modules linked in: [...]\n[ 190.271991] Unloaded tainted modules: intel_uncore_frequency(E):1 skx_edac(E):1\n[ 190.272002] CPU: 1 PID: 6186 Comm: cmd.sh Kdump: loaded Tainted: G E 6.9.0-rc6-default #5 158d3e1e6d0b091c34c3b96bfd99a1c58306d79f\n[ 190.272011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552c-rebuilt.opensuse.org 04/01/2014\n[ 190.272015] RIP: 0010:rb_check_pages.isra.0+0x6a/0xa0\n[ 190.272023] Code: [...]\n[ 190.272028] RSP: 0018:ffff9c37463abb70 EFLAGS: 00010206\n[ 190.272034] RAX: ffff8eba04b6cb80 RBX: 0000000000000007 RCX: ffff8eba01f13d80\n[ 190.272038] RDX: ffff8eba01f130c0 RSI: ffff8eba04b6cd00 RDI: ffff8eba0004c700\n[ 190.272042] RBP: ffff8eba0004c700 R08: 0000000000010002 R09: 0000000000000000\n[ 190.272045] R10: 00000000ffff7f52 R11: ffff8eba7f600000 R12: ffff8eba0004c720\n[ 190.272049] R13: ffff8eba00223a00 R14: 0000000000000008 R15: ffff8eba067a8000\n[ 190.272053] FS: 00007f1bd64752c0(0000) GS:ffff8eba7f680000(0000) knlGS:0000000000000000\n[ 190.272057] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 190.272061] CR2: 00007f1bd6662590 CR3: 000000010291e001 CR4: 0000000000370ef0\n[ 190.272070] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 190.272073] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 190.272077] Call Trace:\n[ 190.272098] \u003cTASK\u003e\n[ 190.272189] ring_buffer_resize+0x2ab/0x460\n[ 190.272199] __tracing_resize_ring_buffer.part.0+0x23/0xa0\n[ 190.272206] tracing_resize_ring_buffer+0x65/0x90\n[ 190.272216] tracing_entries_write+0x74/0xc0\n[ 190.272225] vfs_write+0xf5/0x420\n[ 190.272248] ksys_write+0x67/0xe0\n[ 190.272256] do_syscall_64+0x82/0x170\n[ 190.272363] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 190.272373] RIP: 0033:0x7f1bd657d263\n[ 190.272381] Code: [...]\n[ 190.272385] RSP: 002b:00007ffe72b643f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 190.272391] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f1bd657d263\n[ 190.272395] RDX: 0000000000000002 RSI: 0000555a6eb538e0 RDI: 0000000000000001\n[ 190.272398] RBP: 0000555a6eb538e0 R08: 000000000000000a R09: 0000000000000000\n[ 190.272401] R10: 0000555a6eb55190 R11: 0000000000000246 R12: 00007f1bd6662500\n[ 190.272404] R13: 0000000000000002 R14: 00007f1bd6667c00 R15: 0000000000000002\n[ 190.272412] \u003c/TASK\u003e\n[ 190.272414] ---[ end trace 0000000000000000 ]---\n\nNote that ring_buffer_resize() calls rb_check_pages() only if the parent\ntrace_buffer has recording disabled. Recent commit d78ab792705c\n(\"tracing: Stop current tracer when resizing buffer\") causes that it is\nnow always the case which makes it more likely to experience this issue.\n\nThe window to hit this race is nonetheless very small. To help\nreproducing it, one can add a delay loop in rb_get_reader_page():\n\n ret = rb_head_page_replace(reader, cpu_buffer-\u003ereader_page);\n if (!ret)\n \tgoto spin;\n for (unsigned i = 0; i \u003c 1U \u003c\u003c 26; i++) /* inserted delay loop */\n \t__asm__ __volatile__ (\"\" : : : \"memory\");\n rb_list_head(reader-\u003elist.next)-\u003eprev = \u0026cpu_buffer-\u003ereader_page-\u003elist;\n\n.. \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38601",
"url": "https://www.suse.com/security/cve/CVE-2024-38601"
},
{
"category": "external",
"summary": "SUSE Bug 1226876 for CVE-2024-38601",
"url": "https://bugzilla.suse.com/1226876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38601"
},
{
"cve": "CVE-2024-38608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38608"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix netif state handling\n\nmlx5e_suspend cleans resources only if netif_device_present() returns\ntrue. However, mlx5e_resume changes the state of netif, via\nmlx5e_nic_enable, only if reg_state == NETREG_REGISTERED.\nIn the below case, the above leads to NULL-ptr Oops[1] and memory\nleaks:\n\nmlx5e_probe\n _mlx5e_resume\n mlx5e_attach_netdev\n mlx5e_nic_enable \u003c-- netdev not reg, not calling netif_device_attach()\n register_netdev \u003c-- failed for some reason.\nERROR_FLOW:\n _mlx5e_suspend \u003c-- netif_device_present return false, resources aren\u0027t freed :(\n\nHence, clean resources in this case as well.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 0 P4D 0\nOops: 0010 [#1] SMP\nCPU: 2 PID: 9345 Comm: test-ovs-ct-gen Not tainted 6.5.0_for_upstream_min_debug_2023_09_05_16_01 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:0x0\nCode: Unable to access opcode bytes at0xffffffffffffffd6.\nRSP: 0018:ffff888178aaf758 EFLAGS: 00010246\nCall Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x60\n ? page_fault_oops+0x14c/0x3c0\n ? exc_page_fault+0x75/0x140\n ? asm_exc_page_fault+0x22/0x30\n notifier_call_chain+0x35/0xb0\n blocking_notifier_call_chain+0x3d/0x60\n mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]\n mlx5_core_uplink_netdev_event_replay+0x3e/0x60 [mlx5_core]\n mlx5_mdev_netdev_track+0x53/0x60 [mlx5_ib]\n mlx5_ib_roce_init+0xc3/0x340 [mlx5_ib]\n __mlx5_ib_add+0x34/0xd0 [mlx5_ib]\n mlx5r_probe+0xe1/0x210 [mlx5_ib]\n ? auxiliary_match_id+0x6a/0x90\n auxiliary_bus_probe+0x38/0x80\n ? driver_sysfs_add+0x51/0x80\n really_probe+0xc9/0x3e0\n ? driver_probe_device+0x90/0x90\n __driver_probe_device+0x80/0x160\n driver_probe_device+0x1e/0x90\n __device_attach_driver+0x7d/0x100\n bus_for_each_drv+0x80/0xd0\n __device_attach+0xbc/0x1f0\n bus_probe_device+0x86/0xa0\n device_add+0x637/0x840\n __auxiliary_device_add+0x3b/0xa0\n add_adev+0xc9/0x140 [mlx5_core]\n mlx5_rescan_drivers_locked+0x22a/0x310 [mlx5_core]\n mlx5_register_device+0x53/0xa0 [mlx5_core]\n mlx5_init_one_devl_locked+0x5c4/0x9c0 [mlx5_core]\n mlx5_init_one+0x3b/0x60 [mlx5_core]\n probe_one+0x44c/0x730 [mlx5_core]\n local_pci_probe+0x3e/0x90\n pci_device_probe+0xbf/0x210\n ? kernfs_create_link+0x5d/0xa0\n ? sysfs_do_create_link_sd+0x60/0xc0\n really_probe+0xc9/0x3e0\n ? driver_probe_device+0x90/0x90\n __driver_probe_device+0x80/0x160\n driver_probe_device+0x1e/0x90\n __device_attach_driver+0x7d/0x100\n bus_for_each_drv+0x80/0xd0\n __device_attach+0xbc/0x1f0\n pci_bus_add_device+0x54/0x80\n pci_iov_add_virtfn+0x2e6/0x320\n sriov_enable+0x208/0x420\n mlx5_core_sriov_configure+0x9e/0x200 [mlx5_core]\n sriov_numvfs_store+0xae/0x1a0\n kernfs_fop_write_iter+0x10c/0x1a0\n vfs_write+0x291/0x3c0\n ksys_write+0x5f/0xe0\n do_syscall_64+0x3d/0x90\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n CR2: 0000000000000000\n ---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38608",
"url": "https://www.suse.com/security/cve/CVE-2024-38608"
},
{
"category": "external",
"summary": "SUSE Bug 1226746 for CVE-2024-38608",
"url": "https://bugzilla.suse.com/1226746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38608"
},
{
"cve": "CVE-2024-38618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38618"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: timer: Set lower bound of start tick time\n\nCurrently ALSA timer doesn\u0027t have the lower limit of the start tick\ntime, and it allows a very small size, e.g. 1 tick with 1ns resolution\nfor hrtimer. Such a situation may lead to an unexpected RCU stall,\nwhere the callback repeatedly queuing the expire update, as reported\nby fuzzer.\n\nThis patch introduces a sanity check of the timer start tick time, so\nthat the system returns an error when a too small start size is set.\nAs of this patch, the lower limit is hard-coded to 100us, which is\nsmall enough but can still work somehow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38618",
"url": "https://www.suse.com/security/cve/CVE-2024-38618"
},
{
"category": "external",
"summary": "SUSE Bug 1226754 for CVE-2024-38618",
"url": "https://bugzilla.suse.com/1226754"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38618"
},
{
"cve": "CVE-2024-38619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38619"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb-storage: alauda: Check whether the media is initialized\n\nThe member \"uzonesize\" of struct alauda_info will remain 0\nif alauda_init_media() fails, potentially causing divide errors\nin alauda_read_data() and alauda_write_lba().\n- Add a member \"media_initialized\" to struct alauda_info.\n- Change a condition in alauda_check_media() to ensure the\n first initialization.\n- Add an error check for the return value of alauda_init_media().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38619",
"url": "https://www.suse.com/security/cve/CVE-2024-38619"
},
{
"category": "external",
"summary": "SUSE Bug 1226861 for CVE-2024-38619",
"url": "https://bugzilla.suse.com/1226861"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38619"
},
{
"cve": "CVE-2024-38621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38621"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: stk1160: fix bounds checking in stk1160_copy_video()\n\nThe subtract in this condition is reversed. The -\u003elength is the length\nof the buffer. The -\u003ebytesused is how many bytes we have copied thus\nfar. When the condition is reversed that means the result of the\nsubtraction is always negative but since it\u0027s unsigned then the result\nis a very high positive value. That means the overflow check is never\ntrue.\n\nAdditionally, the -\u003ebytesused doesn\u0027t actually work for this purpose\nbecause we\u0027re not writing to \"buf-\u003emem + buf-\u003ebytesused\". Instead, the\nmath to calculate the destination where we are writing is a bit\ninvolved. You calculate the number of full lines already written,\nmultiply by two, skip a line if necessary so that we start on an odd\nnumbered line, and add the offset into the line.\n\nTo fix this buffer overflow, just take the actual destination where we\nare writing, if the offset is already out of bounds print an error and\nreturn. Otherwise, write up to buf-\u003elength bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38621",
"url": "https://www.suse.com/security/cve/CVE-2024-38621"
},
{
"category": "external",
"summary": "SUSE Bug 1226895 for CVE-2024-38621",
"url": "https://bugzilla.suse.com/1226895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38621"
},
{
"cve": "CVE-2024-38627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38627"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstm class: Fix a double free in stm_register_device()\n\nThe put_device(\u0026stm-\u003edev) call will trigger stm_device_release() which\nfrees \"stm\" so the vfree(stm) on the next line is a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38627",
"url": "https://www.suse.com/security/cve/CVE-2024-38627"
},
{
"category": "external",
"summary": "SUSE Bug 1226857 for CVE-2024-38627",
"url": "https://bugzilla.suse.com/1226857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38627"
},
{
"cve": "CVE-2024-38659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38659"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nenic: Validate length of nl attributes in enic_set_vf_port\n\nenic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE\nis of length PORT_PROFILE_MAX and that the nl attributes\nIFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX.\nThese attributes are validated (in the function do_setlink in rtnetlink.c)\nusing the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE\nas NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and\nIFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation\nusing the policy is for the max size of the attributes and not on exact\nsize so the length of these attributes might be less than the sizes that\nenic_set_vf_port expects. This might cause an out of bands\nread access in the memcpys of the data of these\nattributes in enic_set_vf_port.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38659",
"url": "https://www.suse.com/security/cve/CVE-2024-38659"
},
{
"category": "external",
"summary": "SUSE Bug 1226883 for CVE-2024-38659",
"url": "https://bugzilla.suse.com/1226883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38659"
},
{
"cve": "CVE-2024-38661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38661"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ap: Fix crash in AP internal function modify_bitmap()\n\nA system crash like this\n\n Failing address: 200000cb7df6f000 TEID: 200000cb7df6f403\n Fault in home space mode while using kernel ASCE.\n AS:00000002d71bc007 R3:00000003fe5b8007 S:000000011a446000 P:000000015660c13d\n Oops: 0038 ilc:3 [#1] PREEMPT SMP\n Modules linked in: mlx5_ib ...\n CPU: 8 PID: 7556 Comm: bash Not tainted 6.9.0-rc7 #8\n Hardware name: IBM 3931 A01 704 (LPAR)\n Krnl PSW : 0704e00180000000 0000014b75e7b606 (ap_parse_bitmap_str+0x10e/0x1f8)\n R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\n Krnl GPRS: 0000000000000001 ffffffffffffffc0 0000000000000001 00000048f96b75d3\n 000000cb00000100 ffffffffffffffff ffffffffffffffff 000000cb7df6fce0\n 000000cb7df6fce0 00000000ffffffff 000000000000002b 00000048ffffffff\n 000003ff9b2dbc80 200000cb7df6fcd8 0000014bffffffc0 000000cb7df6fbc8\n Krnl Code: 0000014b75e7b5fc: a7840047 brc 8,0000014b75e7b68a\n 0000014b75e7b600: 18b2 lr %r11,%r2\n #0000014b75e7b602: a7f4000a brc 15,0000014b75e7b616\n \u003e0000014b75e7b606: eb22d00000e6 laog %r2,%r2,0(%r13)\n 0000014b75e7b60c: a7680001 lhi %r6,1\n 0000014b75e7b610: 187b lr %r7,%r11\n 0000014b75e7b612: 84960021 brxh %r9,%r6,0000014b75e7b654\n 0000014b75e7b616: 18e9 lr %r14,%r9\n Call Trace:\n [\u003c0000014b75e7b606\u003e] ap_parse_bitmap_str+0x10e/0x1f8\n ([\u003c0000014b75e7b5dc\u003e] ap_parse_bitmap_str+0xe4/0x1f8)\n [\u003c0000014b75e7b758\u003e] apmask_store+0x68/0x140\n [\u003c0000014b75679196\u003e] kernfs_fop_write_iter+0x14e/0x1e8\n [\u003c0000014b75598524\u003e] vfs_write+0x1b4/0x448\n [\u003c0000014b7559894c\u003e] ksys_write+0x74/0x100\n [\u003c0000014b7618a440\u003e] __do_syscall+0x268/0x328\n [\u003c0000014b761a3558\u003e] system_call+0x70/0x98\n INFO: lockdep is turned off.\n Last Breaking-Event-Address:\n [\u003c0000014b75e7b636\u003e] ap_parse_bitmap_str+0x13e/0x1f8\n Kernel panic - not syncing: Fatal exception: panic_on_oops\n\noccured when /sys/bus/ap/a[pq]mask was updated with a relative mask value\n(like +0x10-0x12,+60,-90) with one of the numeric values exceeding INT_MAX.\n\nThe fix is simple: use unsigned long values for the internal variables. The\ncorrect checks are already in place in the function but a simple int for\nthe internal variables was used with the possibility to overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38661",
"url": "https://www.suse.com/security/cve/CVE-2024-38661"
},
{
"category": "external",
"summary": "SUSE Bug 1226996 for CVE-2024-38661",
"url": "https://bugzilla.suse.com/1226996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38661"
},
{
"cve": "CVE-2024-38780",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38780"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf/sw-sync: don\u0027t enable IRQ from sync_print_obj()\n\nSince commit a6aa8fca4d79 (\"dma-buf/sw-sync: Reduce irqsave/irqrestore from\nknown context\") by error replaced spin_unlock_irqrestore() with\nspin_unlock_irq() for both sync_debugfs_show() and sync_print_obj() despite\nsync_print_obj() is called from sync_debugfs_show(), lockdep complains\ninconsistent lock state warning.\n\nUse plain spin_{lock,unlock}() for sync_print_obj(), for\nsync_debugfs_show() is already using spin_{lock,unlock}_irq().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38780",
"url": "https://www.suse.com/security/cve/CVE-2024-38780"
},
{
"category": "external",
"summary": "SUSE Bug 1226886 for CVE-2024-38780",
"url": "https://bugzilla.suse.com/1226886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-38780"
},
{
"cve": "CVE-2024-39301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39301"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/9p: fix uninit-value in p9_client_rpc()\n\nSyzbot with the help of KMSAN reported the following error:\n\nBUG: KMSAN: uninit-value in trace_9p_client_res include/trace/events/9p.h:146 [inline]\nBUG: KMSAN: uninit-value in p9_client_rpc+0x1314/0x1340 net/9p/client.c:754\n trace_9p_client_res include/trace/events/9p.h:146 [inline]\n p9_client_rpc+0x1314/0x1340 net/9p/client.c:754\n p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031\n v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410\n v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122\n legacy_get_tree+0x114/0x290 fs/fs_context.c:662\n vfs_get_tree+0xa7/0x570 fs/super.c:1797\n do_new_mount+0x71f/0x15e0 fs/namespace.c:3352\n path_mount+0x742/0x1f20 fs/namespace.c:3679\n do_mount fs/namespace.c:3692 [inline]\n __do_sys_mount fs/namespace.c:3898 [inline]\n __se_sys_mount+0x725/0x810 fs/namespace.c:3875\n __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nUninit was created at:\n __alloc_pages+0x9d6/0xe70 mm/page_alloc.c:4598\n __alloc_pages_node include/linux/gfp.h:238 [inline]\n alloc_pages_node include/linux/gfp.h:261 [inline]\n alloc_slab_page mm/slub.c:2175 [inline]\n allocate_slab mm/slub.c:2338 [inline]\n new_slab+0x2de/0x1400 mm/slub.c:2391\n ___slab_alloc+0x1184/0x33d0 mm/slub.c:3525\n __slab_alloc mm/slub.c:3610 [inline]\n __slab_alloc_node mm/slub.c:3663 [inline]\n slab_alloc_node mm/slub.c:3835 [inline]\n kmem_cache_alloc+0x6d3/0xbe0 mm/slub.c:3852\n p9_tag_alloc net/9p/client.c:278 [inline]\n p9_client_prepare_req+0x20a/0x1770 net/9p/client.c:641\n p9_client_rpc+0x27e/0x1340 net/9p/client.c:688\n p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031\n v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410\n v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122\n legacy_get_tree+0x114/0x290 fs/fs_context.c:662\n vfs_get_tree+0xa7/0x570 fs/super.c:1797\n do_new_mount+0x71f/0x15e0 fs/namespace.c:3352\n path_mount+0x742/0x1f20 fs/namespace.c:3679\n do_mount fs/namespace.c:3692 [inline]\n __do_sys_mount fs/namespace.c:3898 [inline]\n __se_sys_mount+0x725/0x810 fs/namespace.c:3875\n __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875\n do_syscall_64+0xd5/0x1f0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nIf p9_check_errors() fails early in p9_client_rpc(), req-\u003erc.tag\nwill not be properly initialized. However, trace_9p_client_res()\nends up trying to print it out anyway before p9_client_rpc()\nfinishes.\n\nFix this issue by assigning default values to p9_fcall fields\nsuch as \u0027tag\u0027 and (just in case KMSAN unearths something new) \u0027id\u0027\nduring the tag allocation stage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39301",
"url": "https://www.suse.com/security/cve/CVE-2024-39301"
},
{
"category": "external",
"summary": "SUSE Bug 1226994 for CVE-2024-39301",
"url": "https://bugzilla.suse.com/1226994"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-39301"
},
{
"cve": "CVE-2024-39475",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-39475"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: savage: Handle err return when savagefb_check_var failed\n\nThe commit 04e5eac8f3ab(\"fbdev: savage: Error out if pixclock equals zero\")\nchecks the value of pixclock to avoid divide-by-zero error. However\nthe function savagefb_probe doesn\u0027t handle the error return of\nsavagefb_check_var. When pixclock is 0, it will cause divide-by-zero error.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-39475",
"url": "https://www.suse.com/security/cve/CVE-2024-39475"
},
{
"category": "external",
"summary": "SUSE Bug 1227435 for CVE-2024-39475",
"url": "https://bugzilla.suse.com/1227435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.s390x",
"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_222-default-1-8.3.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.222.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.222.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.222.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-18T14:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2024-39475"
}
]
}
suse-su-2024:2362-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP3 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47247: net/mlx5e: Fix use-after-free of encap entry in neigh update handler (bsc#1224865).\n- CVE-2021-47311: net: qcom/emac: fix UAF in emac_remove (bsc#1225010).\n- CVE-2021-47368: enetc: Fix illegal access when reading affinity_hint (bsc#1225161).\n- CVE-2021-47372: net: macb: fix use after free on rmmod (bsc#1225184).\n- CVE-2021-47379: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd (bsc#1225203).\n- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).\n- CVE-2022-48760: USB: core: Fix hang in usb_kill_urb by adding memory barriers (bsc#1226712).\n- CVE-2023-52707: sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1225109). polled (bsc#1202623).\n- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).\n- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).\n- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).\n- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).\n- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).\n- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).\n- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).\n- CVE-2024-35950: drm/client: Fully protect modes with dev-\u003emode_config.mutex (bsc#1224703).\n- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).\n- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).\n- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).\n- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).\n- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595)\n- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226758).\n- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).\n\nThe following non-security bugs were fixed:\n\n- NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).\n- ocfs2: adjust enabling place for la window (bsc#1219224).\n- ocfs2: fix sparse warnings (bsc#1219224).\n- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).\n- ocfs2: speed up chain-list searching (bsc#1219224).\n- psi: Fix uaf issue when psi trigger is destroyed while being\n- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2362,SUSE-SLE-Module-Live-Patching-15-SP3-2024-2362,SUSE-SLE-Product-HA-15-SP3-2024-2362,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-2362,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-2362,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-2362,SUSE-SUSE-MicroOS-5.1-2024-2362,SUSE-SUSE-MicroOS-5.2-2024-2362,SUSE-Storage-7.1-2024-2362",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2362-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2362-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242362-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2362-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035872.html"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1171988",
"url": "https://bugzilla.suse.com/1171988"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1181147",
"url": "https://bugzilla.suse.com/1181147"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1195065",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "self",
"summary": "SUSE Bug 1195254",
"url": "https://bugzilla.suse.com/1195254"
},
{
"category": "self",
"summary": "SUSE Bug 1195798",
"url": "https://bugzilla.suse.com/1195798"
},
{
"category": "self",
"summary": "SUSE Bug 1202623",
"url": "https://bugzilla.suse.com/1202623"
},
{
"category": "self",
"summary": "SUSE Bug 1218148",
"url": "https://bugzilla.suse.com/1218148"
},
{
"category": "self",
"summary": "SUSE Bug 1219224",
"url": "https://bugzilla.suse.com/1219224"
},
{
"category": "self",
"summary": "SUSE Bug 1219633",
"url": "https://bugzilla.suse.com/1219633"
},
{
"category": "self",
"summary": "SUSE Bug 1222015",
"url": "https://bugzilla.suse.com/1222015"
},
{
"category": "self",
"summary": "SUSE Bug 1223011",
"url": "https://bugzilla.suse.com/1223011"
},
{
"category": "self",
"summary": "SUSE Bug 1223384",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "self",
"summary": "SUSE Bug 1224671",
"url": "https://bugzilla.suse.com/1224671"
},
{
"category": "self",
"summary": "SUSE Bug 1224703",
"url": "https://bugzilla.suse.com/1224703"
},
{
"category": "self",
"summary": "SUSE Bug 1224749",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "self",
"summary": "SUSE Bug 1224764",
"url": "https://bugzilla.suse.com/1224764"
},
{
"category": "self",
"summary": "SUSE Bug 1224765",
"url": "https://bugzilla.suse.com/1224765"
},
{
"category": "self",
"summary": "SUSE Bug 1224766",
"url": "https://bugzilla.suse.com/1224766"
},
{
"category": "self",
"summary": "SUSE Bug 1224865",
"url": "https://bugzilla.suse.com/1224865"
},
{
"category": "self",
"summary": "SUSE Bug 1225010",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "self",
"summary": "SUSE Bug 1225047",
"url": "https://bugzilla.suse.com/1225047"
},
{
"category": "self",
"summary": "SUSE Bug 1225109",
"url": "https://bugzilla.suse.com/1225109"
},
{
"category": "self",
"summary": "SUSE Bug 1225161",
"url": "https://bugzilla.suse.com/1225161"
},
{
"category": "self",
"summary": "SUSE Bug 1225184",
"url": "https://bugzilla.suse.com/1225184"
},
{
"category": "self",
"summary": "SUSE Bug 1225203",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "self",
"summary": "SUSE Bug 1225487",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "self",
"summary": "SUSE Bug 1225518",
"url": "https://bugzilla.suse.com/1225518"
},
{
"category": "self",
"summary": "SUSE Bug 1225611",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "self",
"summary": "SUSE Bug 1225732",
"url": "https://bugzilla.suse.com/1225732"
},
{
"category": "self",
"summary": "SUSE Bug 1225749",
"url": "https://bugzilla.suse.com/1225749"
},
{
"category": "self",
"summary": "SUSE Bug 1225840",
"url": "https://bugzilla.suse.com/1225840"
},
{
"category": "self",
"summary": "SUSE Bug 1225866",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "self",
"summary": "SUSE Bug 1226226",
"url": "https://bugzilla.suse.com/1226226"
},
{
"category": "self",
"summary": "SUSE Bug 1226537",
"url": "https://bugzilla.suse.com/1226537"
},
{
"category": "self",
"summary": "SUSE Bug 1226552",
"url": "https://bugzilla.suse.com/1226552"
},
{
"category": "self",
"summary": "SUSE Bug 1226554",
"url": "https://bugzilla.suse.com/1226554"
},
{
"category": "self",
"summary": "SUSE Bug 1226557",
"url": "https://bugzilla.suse.com/1226557"
},
{
"category": "self",
"summary": "SUSE Bug 1226558",
"url": "https://bugzilla.suse.com/1226558"
},
{
"category": "self",
"summary": "SUSE Bug 1226562",
"url": "https://bugzilla.suse.com/1226562"
},
{
"category": "self",
"summary": "SUSE Bug 1226563",
"url": "https://bugzilla.suse.com/1226563"
},
{
"category": "self",
"summary": "SUSE Bug 1226575",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "self",
"summary": "SUSE Bug 1226583",
"url": "https://bugzilla.suse.com/1226583"
},
{
"category": "self",
"summary": "SUSE Bug 1226585",
"url": "https://bugzilla.suse.com/1226585"
},
{
"category": "self",
"summary": "SUSE Bug 1226587",
"url": "https://bugzilla.suse.com/1226587"
},
{
"category": "self",
"summary": "SUSE Bug 1226595",
"url": "https://bugzilla.suse.com/1226595"
},
{
"category": "self",
"summary": "SUSE Bug 1226614",
"url": "https://bugzilla.suse.com/1226614"
},
{
"category": "self",
"summary": "SUSE Bug 1226619",
"url": "https://bugzilla.suse.com/1226619"
},
{
"category": "self",
"summary": "SUSE Bug 1226621",
"url": "https://bugzilla.suse.com/1226621"
},
{
"category": "self",
"summary": "SUSE Bug 1226624",
"url": "https://bugzilla.suse.com/1226624"
},
{
"category": "self",
"summary": "SUSE Bug 1226643",
"url": "https://bugzilla.suse.com/1226643"
},
{
"category": "self",
"summary": "SUSE Bug 1226644",
"url": "https://bugzilla.suse.com/1226644"
},
{
"category": "self",
"summary": "SUSE Bug 1226645",
"url": "https://bugzilla.suse.com/1226645"
},
{
"category": "self",
"summary": "SUSE Bug 1226647",
"url": "https://bugzilla.suse.com/1226647"
},
{
"category": "self",
"summary": "SUSE Bug 1226650",
"url": "https://bugzilla.suse.com/1226650"
},
{
"category": "self",
"summary": "SUSE Bug 1226669",
"url": "https://bugzilla.suse.com/1226669"
},
{
"category": "self",
"summary": "SUSE Bug 1226670",
"url": "https://bugzilla.suse.com/1226670"
},
{
"category": "self",
"summary": "SUSE Bug 1226672",
"url": "https://bugzilla.suse.com/1226672"
},
{
"category": "self",
"summary": "SUSE Bug 1226674",
"url": "https://bugzilla.suse.com/1226674"
},
{
"category": "self",
"summary": "SUSE Bug 1226679",
"url": "https://bugzilla.suse.com/1226679"
},
{
"category": "self",
"summary": "SUSE Bug 1226686",
"url": "https://bugzilla.suse.com/1226686"
},
{
"category": "self",
"summary": "SUSE Bug 1226691",
"url": "https://bugzilla.suse.com/1226691"
},
{
"category": "self",
"summary": "SUSE Bug 1226692",
"url": "https://bugzilla.suse.com/1226692"
},
{
"category": "self",
"summary": "SUSE Bug 1226698",
"url": "https://bugzilla.suse.com/1226698"
},
{
"category": "self",
"summary": "SUSE Bug 1226703",
"url": "https://bugzilla.suse.com/1226703"
},
{
"category": "self",
"summary": "SUSE Bug 1226708",
"url": "https://bugzilla.suse.com/1226708"
},
{
"category": "self",
"summary": "SUSE Bug 1226709",
"url": "https://bugzilla.suse.com/1226709"
},
{
"category": "self",
"summary": "SUSE Bug 1226711",
"url": "https://bugzilla.suse.com/1226711"
},
{
"category": "self",
"summary": "SUSE Bug 1226712",
"url": "https://bugzilla.suse.com/1226712"
},
{
"category": "self",
"summary": "SUSE Bug 1226713",
"url": "https://bugzilla.suse.com/1226713"
},
{
"category": "self",
"summary": "SUSE Bug 1226715",
"url": "https://bugzilla.suse.com/1226715"
},
{
"category": "self",
"summary": "SUSE Bug 1226716",
"url": "https://bugzilla.suse.com/1226716"
},
{
"category": "self",
"summary": "SUSE Bug 1226720",
"url": "https://bugzilla.suse.com/1226720"
},
{
"category": "self",
"summary": "SUSE Bug 1226721",
"url": "https://bugzilla.suse.com/1226721"
},
{
"category": "self",
"summary": "SUSE Bug 1226732",
"url": "https://bugzilla.suse.com/1226732"
},
{
"category": "self",
"summary": "SUSE Bug 1226758",
"url": "https://bugzilla.suse.com/1226758"
},
{
"category": "self",
"summary": "SUSE Bug 1226762",
"url": "https://bugzilla.suse.com/1226762"
},
{
"category": "self",
"summary": "SUSE Bug 1226786",
"url": "https://bugzilla.suse.com/1226786"
},
{
"category": "self",
"summary": "SUSE Bug 1226962",
"url": "https://bugzilla.suse.com/1226962"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3896 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4439 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47247 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47247/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47311 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47328 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47368 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47372 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47571 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47583 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47589 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47595 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47596 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47600 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47602 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47611 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47617 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47618 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47619 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47620 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0435 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22942 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48711 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48715 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48717 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48724 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48726 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48728 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48730 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48732 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48736 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48737 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48738 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48746 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48747 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48749 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48752 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48754 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48756 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48758 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48759 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48760 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48767 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48771 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-24023 page",
"url": "https://www.suse.com/security/cve/CVE-2023-24023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52707 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52752 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52881 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26822 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35789 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35861 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35862 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35864 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35878 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35878/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35950 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36894 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36894/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36904 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36940 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36964 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38541 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38559 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38560 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38560/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-07-09T14:02:32Z",
"generator": {
"date": "2024-07-09T14:02:32Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2362-1",
"initial_release_date": "2024-07-09T14:02:32Z",
"revision_history": [
{
"date": "2024-07-09T14:02:32Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-al-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-altera-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-amd-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-apm-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-arm-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-cavium-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-exynos-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-freescale-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-lg-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-marvell-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-qcom-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-renesas-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-socionext-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-sprd-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-150300.59.167.1.aarch64",
"product_id": "dtb-zte-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-64kb-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-default-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"product_id": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.167.1.aarch64",
"product_id": "kernel-syms-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-150300.59.167.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.167.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.167.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150300.59.167.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150300.59.167.1.noarch",
"product_id": "kernel-devel-5.3.18-150300.59.167.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150300.59.167.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150300.59.167.1.noarch",
"product_id": "kernel-docs-5.3.18-150300.59.167.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150300.59.167.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150300.59.167.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150300.59.167.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150300.59.167.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150300.59.167.1.noarch",
"product_id": "kernel-macros-5.3.18-150300.59.167.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150300.59.167.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150300.59.167.1.noarch",
"product_id": "kernel-source-5.3.18-150300.59.167.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150300.59.167.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150300.59.167.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150300.59.167.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-default-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150300.59.167.1.s390x",
"product_id": "kernel-default-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"product_id": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.167.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.167.1.s390x",
"product_id": "kernel-default-optional-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.167.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150300.59.167.1.s390x",
"product_id": "kernel-syms-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.167.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-debug-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-default-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"product_id": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150300.59.167.1.150300.18.98.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150300_59_167-preempt-1-150300.7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150300_59_167-preempt-1-150300.7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150300_59_167-preempt-1-150300.7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150300.59.167.1.x86_64",
"product_id": "kernel-syms-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150300.59.167.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150300.59.167.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.167.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-150300.59.167.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150300.59.167.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150300.59.167.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150300.59.167.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.167.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150300.59.167.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150300.59.167.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150300.59.167.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.167.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150300.59.167.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3896"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3896",
"url": "https://www.suse.com/security/cve/CVE-2021-3896"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-3896",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-3896"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2021-4439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: cpai: check ctr-\u003ecnr to avoid array index out of bound\n\nThe cmtp_add_connection() would add a cmtp session to a controller\nand run a kernel thread to process cmtp.\n\n\t__module_get(THIS_MODULE);\n\tsession-\u003etask = kthread_run(cmtp_session, session, \"kcmtpd_ctr_%d\",\n\t\t\t\t\t\t\t\tsession-\u003enum);\n\nDuring this process, the kernel thread would call detach_capi_ctr()\nto detach a register controller. if the controller\nwas not attached yet, detach_capi_ctr() would\ntrigger an array-index-out-bounds bug.\n\n[ 46.866069][ T6479] UBSAN: array-index-out-of-bounds in\ndrivers/isdn/capi/kcapi.c:483:21\n[ 46.867196][ T6479] index -1 is out of range for type \u0027capi_ctr *[32]\u0027\n[ 46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 Not tainted\n5.15.0-rc2+ #8\n[ 46.869002][ T6479] Hardware name: QEMU Standard PC (i440FX + PIIX,\n1996), BIOS 1.14.0-2 04/01/2014\n[ 46.870107][ T6479] Call Trace:\n[ 46.870473][ T6479] dump_stack_lvl+0x57/0x7d\n[ 46.870974][ T6479] ubsan_epilogue+0x5/0x40\n[ 46.871458][ T6479] __ubsan_handle_out_of_bounds.cold+0x43/0x48\n[ 46.872135][ T6479] detach_capi_ctr+0x64/0xc0\n[ 46.872639][ T6479] cmtp_session+0x5c8/0x5d0\n[ 46.873131][ T6479] ? __init_waitqueue_head+0x60/0x60\n[ 46.873712][ T6479] ? cmtp_add_msgpart+0x120/0x120\n[ 46.874256][ T6479] kthread+0x147/0x170\n[ 46.874709][ T6479] ? set_kthread_struct+0x40/0x40\n[ 46.875248][ T6479] ret_from_fork+0x1f/0x30\n[ 46.875773][ T6479]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4439",
"url": "https://www.suse.com/security/cve/CVE-2021-4439"
},
{
"category": "external",
"summary": "SUSE Bug 1226670 for CVE-2021-4439",
"url": "https://bugzilla.suse.com/1226670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-4439"
},
{
"cve": "CVE-2021-47247",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47247"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix use-after-free of encap entry in neigh update handler\n\nFunction mlx5e_rep_neigh_update() wasn\u0027t updated to accommodate rtnl lock\nremoval from TC filter update path and properly handle concurrent encap\nentry insertion/deletion which can lead to following use-after-free:\n\n [23827.464923] ==================================================================\n [23827.469446] BUG: KASAN: use-after-free in mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.470971] Read of size 4 at addr ffff8881d132228c by task kworker/u20:6/21635\n [23827.472251]\n [23827.472615] CPU: 9 PID: 21635 Comm: kworker/u20:6 Not tainted 5.13.0-rc3+ #5\n [23827.473788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n [23827.475639] Workqueue: mlx5e mlx5e_rep_neigh_update [mlx5_core]\n [23827.476731] Call Trace:\n [23827.477260] dump_stack+0xbb/0x107\n [23827.477906] print_address_description.constprop.0+0x18/0x140\n [23827.478896] ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.479879] ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.480905] kasan_report.cold+0x7c/0xd8\n [23827.481701] ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.482744] kasan_check_range+0x145/0x1a0\n [23827.493112] mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.494054] ? mlx5e_tc_tun_encap_info_equal_generic+0x140/0x140 [mlx5_core]\n [23827.495296] mlx5e_rep_neigh_update+0x41e/0x5e0 [mlx5_core]\n [23827.496338] ? mlx5e_rep_neigh_entry_release+0xb80/0xb80 [mlx5_core]\n [23827.497486] ? read_word_at_a_time+0xe/0x20\n [23827.498250] ? strscpy+0xa0/0x2a0\n [23827.498889] process_one_work+0x8ac/0x14e0\n [23827.499638] ? lockdep_hardirqs_on_prepare+0x400/0x400\n [23827.500537] ? pwq_dec_nr_in_flight+0x2c0/0x2c0\n [23827.501359] ? rwlock_bug.part.0+0x90/0x90\n [23827.502116] worker_thread+0x53b/0x1220\n [23827.502831] ? process_one_work+0x14e0/0x14e0\n [23827.503627] kthread+0x328/0x3f0\n [23827.504254] ? _raw_spin_unlock_irq+0x24/0x40\n [23827.505065] ? __kthread_bind_mask+0x90/0x90\n [23827.505912] ret_from_fork+0x1f/0x30\n [23827.506621]\n [23827.506987] Allocated by task 28248:\n [23827.507694] kasan_save_stack+0x1b/0x40\n [23827.508476] __kasan_kmalloc+0x7c/0x90\n [23827.509197] mlx5e_attach_encap+0xde1/0x1d40 [mlx5_core]\n [23827.510194] mlx5e_tc_add_fdb_flow+0x397/0xc40 [mlx5_core]\n [23827.511218] __mlx5e_add_fdb_flow+0x519/0xb30 [mlx5_core]\n [23827.512234] mlx5e_configure_flower+0x191c/0x4870 [mlx5_core]\n [23827.513298] tc_setup_cb_add+0x1d5/0x420\n [23827.514023] fl_hw_replace_filter+0x382/0x6a0 [cls_flower]\n [23827.514975] fl_change+0x2ceb/0x4a51 [cls_flower]\n [23827.515821] tc_new_tfilter+0x89a/0x2070\n [23827.516548] rtnetlink_rcv_msg+0x644/0x8c0\n [23827.517300] netlink_rcv_skb+0x11d/0x340\n [23827.518021] netlink_unicast+0x42b/0x700\n [23827.518742] netlink_sendmsg+0x743/0xc20\n [23827.519467] sock_sendmsg+0xb2/0xe0\n [23827.520131] ____sys_sendmsg+0x590/0x770\n [23827.520851] ___sys_sendmsg+0xd8/0x160\n [23827.521552] __sys_sendmsg+0xb7/0x140\n [23827.522238] do_syscall_64+0x3a/0x70\n [23827.522907] entry_SYSCALL_64_after_hwframe+0x44/0xae\n [23827.523797]\n [23827.524163] Freed by task 25948:\n [23827.524780] kasan_save_stack+0x1b/0x40\n [23827.525488] kasan_set_track+0x1c/0x30\n [23827.526187] kasan_set_free_info+0x20/0x30\n [23827.526968] __kasan_slab_free+0xed/0x130\n [23827.527709] slab_free_freelist_hook+0xcf/0x1d0\n [23827.528528] kmem_cache_free_bulk+0x33a/0x6e0\n [23827.529317] kfree_rcu_work+0x55f/0xb70\n [23827.530024] process_one_work+0x8ac/0x14e0\n [23827.530770] worker_thread+0x53b/0x1220\n [23827.531480] kthread+0x328/0x3f0\n [23827.532114] ret_from_fork+0x1f/0x30\n [23827.532785]\n [23827.533147] Last potentially related work creation:\n [23827.534007] kasan_save_stack+0x1b/0x40\n [23827.534710] kasan_record_aux_stack+0xab/0xc0\n [23827.535492] kvfree_call_rcu+0x31/0x7b0\n [23827.536206] mlx5e_tc_del\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47247",
"url": "https://www.suse.com/security/cve/CVE-2021-47247"
},
{
"category": "external",
"summary": "SUSE Bug 1224865 for CVE-2021-47247",
"url": "https://bugzilla.suse.com/1224865"
},
{
"category": "external",
"summary": "SUSE Bug 1227500 for CVE-2021-47247",
"url": "https://bugzilla.suse.com/1227500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2021-47247"
},
{
"cve": "CVE-2021-47311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47311"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qcom/emac: fix UAF in emac_remove\n\nadpt is netdev private data and it cannot be\nused after free_netdev() call. Using adpt after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47311",
"url": "https://www.suse.com/security/cve/CVE-2021-47311"
},
{
"category": "external",
"summary": "SUSE Bug 1225010 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "external",
"summary": "SUSE Bug 1227752 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1227752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47311"
},
{
"cve": "CVE-2021-47328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47328"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix conn use after free during resets\n\nIf we haven\u0027t done a unbind target call we can race where\niscsi_conn_teardown wakes up the EH thread and then frees the conn while\nthose threads are still accessing the conn ehwait.\n\nWe can only do one TMF per session so this just moves the TMF fields from\nthe conn to the session. We can then rely on the\niscsi_session_teardown-\u003eiscsi_remove_session-\u003e__iscsi_unbind_session call\nto remove the target and it\u0027s devices, and know after that point there is\nno device or scsi-ml callout trying to access the session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47328",
"url": "https://www.suse.com/security/cve/CVE-2021-47328"
},
{
"category": "external",
"summary": "SUSE Bug 1225047 for CVE-2021-47328",
"url": "https://bugzilla.suse.com/1225047"
},
{
"category": "external",
"summary": "SUSE Bug 1225080 for CVE-2021-47328",
"url": "https://bugzilla.suse.com/1225080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47328"
},
{
"cve": "CVE-2021-47368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47368"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nenetc: Fix illegal access when reading affinity_hint\n\nirq_set_affinity_hit() stores a reference to the cpumask_t\nparameter in the irq descriptor, and that reference can be\naccessed later from irq_affinity_hint_proc_show(). Since\nthe cpu_mask parameter passed to irq_set_affinity_hit() has\nonly temporary storage (it\u0027s on the stack memory), later\naccesses to it are illegal. Thus reads from the corresponding\nprocfs affinity_hint file can result in paging request oops.\n\nThe issue is fixed by the get_cpu_mask() helper, which provides\na permanent storage for the cpumask_t parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47368",
"url": "https://www.suse.com/security/cve/CVE-2021-47368"
},
{
"category": "external",
"summary": "SUSE Bug 1225161 for CVE-2021-47368",
"url": "https://bugzilla.suse.com/1225161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47368"
},
{
"cve": "CVE-2021-47372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47372"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix use after free on rmmod\n\nplat_dev-\u003edev-\u003eplatform_data is released by platform_device_unregister(),\nuse of pclk and hclk is a use-after-free. Since device unregister won\u0027t\nneed a clk device we adjust the function call sequence to fix this issue.\n\n[ 31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci]\n[ 31.275563] Freed by task 306:\n[ 30.276782] platform_device_release+0x25/0x80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47372",
"url": "https://www.suse.com/security/cve/CVE-2021-47372"
},
{
"category": "external",
"summary": "SUSE Bug 1225184 for CVE-2021-47372",
"url": "https://bugzilla.suse.com/1225184"
},
{
"category": "external",
"summary": "SUSE Bug 1229946 for CVE-2021-47372",
"url": "https://bugzilla.suse.com/1229946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2021-47372"
},
{
"cve": "CVE-2021-47379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd\n\nKASAN reports a use-after-free report when doing fuzz test:\n\n[693354.104835] ==================================================================\n[693354.105094] BUG: KASAN: use-after-free in bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105336] Read of size 4 at addr ffff888be0a35664 by task sh/1453338\n\n[693354.105607] CPU: 41 PID: 1453338 Comm: sh Kdump: loaded Not tainted 4.18.0-147\n[693354.105610] Hardware name: Huawei 2288H V5/BC11SPSCB0, BIOS 0.81 07/02/2018\n[693354.105612] Call Trace:\n[693354.105621] dump_stack+0xf1/0x19b\n[693354.105626] ? show_regs_print_info+0x5/0x5\n[693354.105634] ? printk+0x9c/0xc3\n[693354.105638] ? cpumask_weight+0x1f/0x1f\n[693354.105648] print_address_description+0x70/0x360\n[693354.105654] kasan_report+0x1b2/0x330\n[693354.105659] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105665] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105670] bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105675] ? bfq_cpd_init+0x20/0x20\n[693354.105683] cgroup_file_write+0x3aa/0x510\n[693354.105693] ? ___slab_alloc+0x507/0x540\n[693354.105698] ? cgroup_file_poll+0x60/0x60\n[693354.105702] ? 0xffffffff89600000\n[693354.105708] ? usercopy_abort+0x90/0x90\n[693354.105716] ? mutex_lock+0xef/0x180\n[693354.105726] kernfs_fop_write+0x1ab/0x280\n[693354.105732] ? cgroup_file_poll+0x60/0x60\n[693354.105738] vfs_write+0xe7/0x230\n[693354.105744] ksys_write+0xb0/0x140\n[693354.105749] ? __ia32_sys_read+0x50/0x50\n[693354.105760] do_syscall_64+0x112/0x370\n[693354.105766] ? syscall_return_slowpath+0x260/0x260\n[693354.105772] ? do_page_fault+0x9b/0x270\n[693354.105779] ? prepare_exit_to_usermode+0xf9/0x1a0\n[693354.105784] ? enter_from_user_mode+0x30/0x30\n[693354.105793] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.105875] Allocated by task 1453337:\n[693354.106001] kasan_kmalloc+0xa0/0xd0\n[693354.106006] kmem_cache_alloc_node_trace+0x108/0x220\n[693354.106010] bfq_pd_alloc+0x96/0x120\n[693354.106015] blkcg_activate_policy+0x1b7/0x2b0\n[693354.106020] bfq_create_group_hierarchy+0x1e/0x80\n[693354.106026] bfq_init_queue+0x678/0x8c0\n[693354.106031] blk_mq_init_sched+0x1f8/0x460\n[693354.106037] elevator_switch_mq+0xe1/0x240\n[693354.106041] elevator_switch+0x25/0x40\n[693354.106045] elv_iosched_store+0x1a1/0x230\n[693354.106049] queue_attr_store+0x78/0xb0\n[693354.106053] kernfs_fop_write+0x1ab/0x280\n[693354.106056] vfs_write+0xe7/0x230\n[693354.106060] ksys_write+0xb0/0x140\n[693354.106064] do_syscall_64+0x112/0x370\n[693354.106069] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106114] Freed by task 1453336:\n[693354.106225] __kasan_slab_free+0x130/0x180\n[693354.106229] kfree+0x90/0x1b0\n[693354.106233] blkcg_deactivate_policy+0x12c/0x220\n[693354.106238] bfq_exit_queue+0xf5/0x110\n[693354.106241] blk_mq_exit_sched+0x104/0x130\n[693354.106245] __elevator_exit+0x45/0x60\n[693354.106249] elevator_switch_mq+0xd6/0x240\n[693354.106253] elevator_switch+0x25/0x40\n[693354.106257] elv_iosched_store+0x1a1/0x230\n[693354.106261] queue_attr_store+0x78/0xb0\n[693354.106264] kernfs_fop_write+0x1ab/0x280\n[693354.106268] vfs_write+0xe7/0x230\n[693354.106271] ksys_write+0xb0/0x140\n[693354.106275] do_syscall_64+0x112/0x370\n[693354.106280] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106329] The buggy address belongs to the object at ffff888be0a35580\n which belongs to the cache kmalloc-1k of size 1024\n[693354.106736] The buggy address is located 228 bytes inside of\n 1024-byte region [ffff888be0a35580, ffff888be0a35980)\n[693354.107114] The buggy address belongs to the page:\n[693354.107273] page:ffffea002f828c00 count:1 mapcount:0 mapping:ffff888107c17080 index:0x0 compound_mapcount: 0\n[693354.107606] flags: 0x17ffffc0008100(slab|head)\n[693354.107760] raw: 0017ffffc0008100 ffffea002fcbc808 ffffea0030bd3a08 ffff888107c17080\n[693354.108020] r\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47379",
"url": "https://www.suse.com/security/cve/CVE-2021-47379"
},
{
"category": "external",
"summary": "SUSE Bug 1225203 for CVE-2021-47379",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "external",
"summary": "SUSE Bug 1225204 for CVE-2021-47379",
"url": "https://bugzilla.suse.com/1225204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47379"
},
{
"cve": "CVE-2021-47571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47571"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()\n\nThe free_rtllib() function frees the \"dev\" pointer so there is use\nafter free on the next line. Re-arrange things to avoid that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47571",
"url": "https://www.suse.com/security/cve/CVE-2021-47571"
},
{
"category": "external",
"summary": "SUSE Bug 1225518 for CVE-2021-47571",
"url": "https://bugzilla.suse.com/1225518"
},
{
"category": "external",
"summary": "SUSE Bug 1227551 for CVE-2021-47571",
"url": "https://bugzilla.suse.com/1227551"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2021-47571"
},
{
"cve": "CVE-2021-47576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47576"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()\n\nIn resp_mode_select() sanity check the block descriptor len to avoid UAF.\n\nBUG: KASAN: use-after-free in resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509\nRead of size 1 at addr ffff888026670f50 by task scsicmd/15032\n\nCPU: 1 PID: 15032 Comm: scsicmd Not tainted 5.15.0-01d0625 #15\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:107\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:257\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:443\n __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:306\n resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509\n schedule_resp+0x4af/0x1a10 drivers/scsi/scsi_debug.c:5483\n scsi_debug_queuecommand+0x8c9/0x1e70 drivers/scsi/scsi_debug.c:7537\n scsi_queue_rq+0x16b4/0x2d10 drivers/scsi/scsi_lib.c:1521\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1640\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1762\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1839\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:63\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:837\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:775\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:941\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1166\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:52\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:50\n entry_SYSCALL_64_after_hwframe+0x44/0xae arch/x86/entry/entry_64.S:113",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47576",
"url": "https://www.suse.com/security/cve/CVE-2021-47576"
},
{
"category": "external",
"summary": "SUSE Bug 1226537 for CVE-2021-47576",
"url": "https://bugzilla.suse.com/1226537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "low"
}
],
"title": "CVE-2021-47576"
},
{
"cve": "CVE-2021-47583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47583"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mxl111sf: change mutex_init() location\n\nSyzbot reported, that mxl111sf_ctrl_msg() uses uninitialized\nmutex. The problem was in wrong mutex_init() location.\n\nPrevious mutex_init(\u0026state-\u003emsg_lock) call was in -\u003einit() function, but\ndvb_usbv2_init() has this order of calls:\n\n\tdvb_usbv2_init()\n\t dvb_usbv2_adapter_init()\n\t dvb_usbv2_adapter_frontend_init()\n\t props-\u003efrontend_attach()\n\n\t props-\u003einit()\n\nSince mxl111sf_* devices call mxl111sf_ctrl_msg() in -\u003efrontend_attach()\ninternally we need to initialize state-\u003emsg_lock before\nfrontend_attach(). To achieve it, -\u003eprobe() call added to all mxl111sf_*\ndevices, which will simply initiaize mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47583",
"url": "https://www.suse.com/security/cve/CVE-2021-47583"
},
{
"category": "external",
"summary": "SUSE Bug 1226563 for CVE-2021-47583",
"url": "https://bugzilla.suse.com/1226563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47583"
},
{
"cve": "CVE-2021-47589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47589"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigbvf: fix double free in `igbvf_probe`\n\nIn `igbvf_probe`, if register_netdev() fails, the program will go to\nlabel err_hw_init, and then to label err_ioremap. In free_netdev() which\nis just below label err_ioremap, there is `list_for_each_entry_safe` and\n`netif_napi_del` which aims to delete all entries in `dev-\u003enapi_list`.\nThe program has added an entry `adapter-\u003erx_ring-\u003enapi` which is added by\n`netif_napi_add` in igbvf_alloc_queues(). However, adapter-\u003erx_ring has\nbeen freed below label err_hw_init. So this a UAF.\n\nIn terms of how to patch the problem, we can refer to igbvf_remove() and\ndelete the entry before `adapter-\u003erx_ring`.\n\nThe KASAN logs are as follows:\n\n[ 35.126075] BUG: KASAN: use-after-free in free_netdev+0x1fd/0x450\n[ 35.127170] Read of size 8 at addr ffff88810126d990 by task modprobe/366\n[ 35.128360]\n[ 35.128643] CPU: 1 PID: 366 Comm: modprobe Not tainted 5.15.0-rc2+ #14\n[ 35.129789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[ 35.131749] Call Trace:\n[ 35.132199] dump_stack_lvl+0x59/0x7b\n[ 35.132865] print_address_description+0x7c/0x3b0\n[ 35.133707] ? free_netdev+0x1fd/0x450\n[ 35.134378] __kasan_report+0x160/0x1c0\n[ 35.135063] ? free_netdev+0x1fd/0x450\n[ 35.135738] kasan_report+0x4b/0x70\n[ 35.136367] free_netdev+0x1fd/0x450\n[ 35.137006] igbvf_probe+0x121d/0x1a10 [igbvf]\n[ 35.137808] ? igbvf_vlan_rx_add_vid+0x100/0x100 [igbvf]\n[ 35.138751] local_pci_probe+0x13c/0x1f0\n[ 35.139461] pci_device_probe+0x37e/0x6c0\n[ 35.165526]\n[ 35.165806] Allocated by task 366:\n[ 35.166414] ____kasan_kmalloc+0xc4/0xf0\n[ 35.167117] foo_kmem_cache_alloc_trace+0x3c/0x50 [igbvf]\n[ 35.168078] igbvf_probe+0x9c5/0x1a10 [igbvf]\n[ 35.168866] local_pci_probe+0x13c/0x1f0\n[ 35.169565] pci_device_probe+0x37e/0x6c0\n[ 35.179713]\n[ 35.179993] Freed by task 366:\n[ 35.180539] kasan_set_track+0x4c/0x80\n[ 35.181211] kasan_set_free_info+0x1f/0x40\n[ 35.181942] ____kasan_slab_free+0x103/0x140\n[ 35.182703] kfree+0xe3/0x250\n[ 35.183239] igbvf_probe+0x1173/0x1a10 [igbvf]\n[ 35.184040] local_pci_probe+0x13c/0x1f0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47589",
"url": "https://www.suse.com/security/cve/CVE-2021-47589"
},
{
"category": "external",
"summary": "SUSE Bug 1226557 for CVE-2021-47589",
"url": "https://bugzilla.suse.com/1226557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47589"
},
{
"cve": "CVE-2021-47595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47595"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_ets: don\u0027t remove idle classes from the round-robin list\n\nShuang reported that the following script:\n\n 1) tc qdisc add dev ddd0 handle 10: parent 1: ets bands 8 strict 4 priomap 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7\n 2) mausezahn ddd0 -A 10.10.10.1 -B 10.10.10.2 -c 0 -a own -b 00:c1:a0:c1:a0:00 -t udp \u0026\n 3) tc qdisc change dev ddd0 handle 10: ets bands 4 strict 2 quanta 2500 2500 priomap 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3\n\ncrashes systematically when line 2) is commented:\n\n list_del corruption, ffff8e028404bd30-\u003enext is LIST_POISON1 (dead000000000100)\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:47!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 0 PID: 954 Comm: tc Not tainted 5.16.0-rc4+ #478\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47\n Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff \u003c0f\u003e 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe\n RSP: 0018:ffffae46807a3888 EFLAGS: 00010246\n RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202\n RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff\n RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff\n R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800\n R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400\n FS: 00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000682f48 CR3: 00000001058be000 CR4: 0000000000350ef0\n Call Trace:\n \u003cTASK\u003e\n ets_qdisc_change+0x58b/0xa70 [sch_ets]\n tc_modify_qdisc+0x323/0x880\n rtnetlink_rcv_msg+0x169/0x4a0\n netlink_rcv_skb+0x50/0x100\n netlink_unicast+0x1a5/0x280\n netlink_sendmsg+0x257/0x4d0\n sock_sendmsg+0x5b/0x60\n ____sys_sendmsg+0x1f2/0x260\n ___sys_sendmsg+0x7c/0xc0\n __sys_sendmsg+0x57/0xa0\n do_syscall_64+0x3a/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7efdc8031338\n Code: 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 25 43 2c 00 8b 00 85 c0 75 17 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 41 89 d4 55\n RSP: 002b:00007ffdf1ce9828 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000061b37a97 RCX: 00007efdc8031338\n RDX: 0000000000000000 RSI: 00007ffdf1ce9890 RDI: 0000000000000003\n RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000078a940\n R10: 000000000000000c R11: 0000000000000246 R12: 0000000000000001\n R13: 0000000000688880 R14: 0000000000000000 R15: 0000000000000000\n \u003c/TASK\u003e\n Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt iTCO_vendor_support intel_rapl_msr intel_rapl_common joydev pcspkr i2c_i801 virtio_balloon i2c_smbus lpc_ich ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel serio_raw ghash_clmulni_intel ahci libahci libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod [last unloaded: sch_ets]\n ---[ end trace f35878d1912655c2 ]---\n RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47\n Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff \u003c0f\u003e 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe\n RSP: 0018:ffffae46807a3888 EFLAGS: 00010246\n RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202\n RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff\n RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff\n R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800\n R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400\n FS: 00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000000\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47595",
"url": "https://www.suse.com/security/cve/CVE-2021-47595"
},
{
"category": "external",
"summary": "SUSE Bug 1226552 for CVE-2021-47595",
"url": "https://bugzilla.suse.com/1226552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47595"
},
{
"cve": "CVE-2021-47596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47596"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix use-after-free bug in hclgevf_send_mbx_msg\n\nCurrently, the hns3_remove function firstly uninstall client instance,\nand then uninstall acceletion engine device. The netdevice is freed in\nclient instance uninstall process, but acceletion engine device uninstall\nprocess still use it to trace runtime information. This causes a use after\nfree problem.\n\nSo fixes it by check the instance register state to avoid use after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47596",
"url": "https://www.suse.com/security/cve/CVE-2021-47596"
},
{
"category": "external",
"summary": "SUSE Bug 1226558 for CVE-2021-47596",
"url": "https://bugzilla.suse.com/1226558"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47596"
},
{
"cve": "CVE-2021-47600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47600"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: fix use after free in rebalance_children()\n\nMove dm_tm_unlock() after dm_tm_dec().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47600",
"url": "https://www.suse.com/security/cve/CVE-2021-47600"
},
{
"category": "external",
"summary": "SUSE Bug 1226575 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "external",
"summary": "SUSE Bug 1227472 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1227472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47600"
},
{
"cve": "CVE-2021-47602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: track only QoS data frames for admission control\n\nFor admission control, obviously all of that only works for\nQoS data frames, otherwise we cannot even access the QoS\nfield in the header.\n\nSyzbot reported (see below) an uninitialized value here due\nto a status of a non-QoS nullfunc packet, which isn\u0027t even\nlong enough to contain the QoS header.\n\nFix this to only do anything for QoS data packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47602",
"url": "https://www.suse.com/security/cve/CVE-2021-47602"
},
{
"category": "external",
"summary": "SUSE Bug 1226554 for CVE-2021-47602",
"url": "https://bugzilla.suse.com/1226554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47602"
},
{
"cve": "CVE-2021-47609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47609"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Fix string overflow in SCPI genpd driver\n\nWithout the bound checks for scpi_pd-\u003ename, it could result in the buffer\noverflow when copying the SCPI device name from the corresponding device\ntree node as the name string is set at maximum size of 30.\n\nLet us fix it by using devm_kasprintf so that the string buffer is\nallocated dynamically.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47609",
"url": "https://www.suse.com/security/cve/CVE-2021-47609"
},
{
"category": "external",
"summary": "SUSE Bug 1226562 for CVE-2021-47609",
"url": "https://bugzilla.suse.com/1226562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47609"
},
{
"cve": "CVE-2021-47611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47611"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: validate extended element ID is present\n\nBefore attempting to parse an extended element, verify that\nthe extended element ID is present.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47611",
"url": "https://www.suse.com/security/cve/CVE-2021-47611"
},
{
"category": "external",
"summary": "SUSE Bug 1226583 for CVE-2021-47611",
"url": "https://bugzilla.suse.com/1226583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47611"
},
{
"cve": "CVE-2021-47612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47612"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: fix segfault in nfc_genl_dump_devices_done\n\nWhen kmalloc in nfc_genl_dump_devices() fails then\nnfc_genl_dump_devices_done() segfaults as below\n\nKASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\nCPU: 0 PID: 25 Comm: kworker/0:1 Not tainted 5.16.0-rc4-01180-g2a987e65025e-dirty #5\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-6.fc35 04/01/2014\nWorkqueue: events netlink_sock_destruct_work\nRIP: 0010:klist_iter_exit+0x26/0x80\nCall Trace:\n\u003cTASK\u003e\nclass_dev_iter_exit+0x15/0x20\nnfc_genl_dump_devices_done+0x3b/0x50\ngenl_lock_done+0x84/0xd0\nnetlink_sock_destruct+0x8f/0x270\n__sk_destruct+0x64/0x3b0\nsk_destruct+0xa8/0xd0\n__sk_free+0x2e8/0x3d0\nsk_free+0x51/0x90\nnetlink_sock_destruct_work+0x1c/0x20\nprocess_one_work+0x411/0x710\nworker_thread+0x6fd/0xa80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47612",
"url": "https://www.suse.com/security/cve/CVE-2021-47612"
},
{
"category": "external",
"summary": "SUSE Bug 1226585 for CVE-2021-47612",
"url": "https://bugzilla.suse.com/1226585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47612"
},
{
"cve": "CVE-2021-47617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47617"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: pciehp: Fix infinite loop in IRQ handler upon power fault\n\nThe Power Fault Detected bit in the Slot Status register differs from\nall other hotplug events in that it is sticky: It can only be cleared\nafter turning off slot power. Per PCIe r5.0, sec. 6.7.1.8:\n\n If a power controller detects a main power fault on the hot-plug slot,\n it must automatically set its internal main power fault latch [...].\n The main power fault latch is cleared when software turns off power to\n the hot-plug slot.\n\nThe stickiness used to cause interrupt storms and infinite loops which\nwere fixed in 2009 by commits 5651c48cfafe (\"PCI pciehp: fix power fault\ninterrupt storm problem\") and 99f0169c17f3 (\"PCI: pciehp: enable\nsoftware notification on empty slots\").\n\nUnfortunately in 2020 the infinite loop issue was inadvertently\nreintroduced by commit 8edf5332c393 (\"PCI: pciehp: Fix MSI interrupt\nrace\"): The hardirq handler pciehp_isr() clears the PFD bit until\npciehp\u0027s power_fault_detected flag is set. That happens in the IRQ\nthread pciehp_ist(), which never learns of the event because the hardirq\nhandler is stuck in an infinite loop. Fix by setting the\npower_fault_detected flag already in the hardirq handler.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47617",
"url": "https://www.suse.com/security/cve/CVE-2021-47617"
},
{
"category": "external",
"summary": "SUSE Bug 1226614 for CVE-2021-47617",
"url": "https://bugzilla.suse.com/1226614"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47617"
},
{
"cve": "CVE-2021-47618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47618"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9170/1: fix panic when kasan and kprobe are enabled\n\narm32 uses software to simulate the instruction replaced\nby kprobe. some instructions may be simulated by constructing\nassembly functions. therefore, before executing instruction\nsimulation, it is necessary to construct assembly function\nexecution environment in C language through binding registers.\nafter kasan is enabled, the register binding relationship will\nbe destroyed, resulting in instruction simulation errors and\ncausing kernel panic.\n\nthe kprobe emulate instruction function is distributed in three\nfiles: actions-common.c actions-arm.c actions-thumb.c, so disable\nKASAN when compiling these files.\n\nfor example, use kprobe insert on cap_capable+20 after kasan\nenabled, the cap_capable assembly code is as follows:\n\u003ccap_capable\u003e:\ne92d47f0\tpush\t{r4, r5, r6, r7, r8, r9, sl, lr}\ne1a05000\tmov\tr5, r0\ne280006c\tadd\tr0, r0, #108 ; 0x6c\ne1a04001\tmov\tr4, r1\ne1a06002\tmov\tr6, r2\ne59fa090\tldr\tsl, [pc, #144] ;\nebfc7bf8\tbl\tc03aa4b4 \u003c__asan_load4\u003e\ne595706c\tldr\tr7, [r5, #108] ; 0x6c\ne2859014\tadd\tr9, r5, #20\n......\nThe emulate_ldr assembly code after enabling kasan is as follows:\nc06f1384 \u003cemulate_ldr\u003e:\ne92d47f0\tpush\t{r4, r5, r6, r7, r8, r9, sl, lr}\ne282803c\tadd\tr8, r2, #60 ; 0x3c\ne1a05000\tmov\tr5, r0\ne7e37855\tubfx\tr7, r5, #16, #4\ne1a00008\tmov\tr0, r8\ne1a09001\tmov\tr9, r1\ne1a04002\tmov\tr4, r2\nebf35462\tbl\tc03c6530 \u003c__asan_load4\u003e\ne357000f\tcmp\tr7, #15\ne7e36655\tubfx\tr6, r5, #12, #4\ne205a00f\tand\tsl, r5, #15\n0a000001\tbeq\tc06f13bc \u003cemulate_ldr+0x38\u003e\ne0840107\tadd\tr0, r4, r7, lsl #2\nebf3545c\tbl\tc03c6530 \u003c__asan_load4\u003e\ne084010a\tadd\tr0, r4, sl, lsl #2\nebf3545a\tbl\tc03c6530 \u003c__asan_load4\u003e\ne2890010\tadd\tr0, r9, #16\nebf35458\tbl\tc03c6530 \u003c__asan_load4\u003e\ne5990010\tldr\tr0, [r9, #16]\ne12fff30\tblx\tr0\ne356000f\tcm\tr6, #15\n1a000014\tbne\tc06f1430 \u003cemulate_ldr+0xac\u003e\ne1a06000\tmov\tr6, r0\ne2840040\tadd\tr0, r4, #64 ; 0x40\n......\n\nwhen running in emulate_ldr to simulate the ldr instruction, panic\noccurred, and the log is as follows:\nUnable to handle kernel NULL pointer dereference at virtual address\n00000090\npgd = ecb46400\n[00000090] *pgd=2e0fa003, *pmd=00000000\nInternal error: Oops: 206 [#1] SMP ARM\nPC is at cap_capable+0x14/0xb0\nLR is at emulate_ldr+0x50/0xc0\npsr: 600d0293 sp : ecd63af8 ip : 00000004 fp : c0a7c30c\nr10: 00000000 r9 : c30897f4 r8 : ecd63cd4\nr7 : 0000000f r6 : 0000000a r5 : e59fa090 r4 : ecd63c98\nr3 : c06ae294 r2 : 00000000 r1 : b7611300 r0 : bf4ec008\nFlags: nZCv IRQs off FIQs on Mode SVC_32 ISA ARM Segment user\nControl: 32c5387d Table: 2d546400 DAC: 55555555\nProcess bash (pid: 1643, stack limit = 0xecd60190)\n(cap_capable) from (kprobe_handler+0x218/0x340)\n(kprobe_handler) from (kprobe_trap_handler+0x24/0x48)\n(kprobe_trap_handler) from (do_undefinstr+0x13c/0x364)\n(do_undefinstr) from (__und_svc_finish+0x0/0x30)\n(__und_svc_finish) from (cap_capable+0x18/0xb0)\n(cap_capable) from (cap_vm_enough_memory+0x38/0x48)\n(cap_vm_enough_memory) from\n(security_vm_enough_memory_mm+0x48/0x6c)\n(security_vm_enough_memory_mm) from\n(copy_process.constprop.5+0x16b4/0x25c8)\n(copy_process.constprop.5) from (_do_fork+0xe8/0x55c)\n(_do_fork) from (SyS_clone+0x1c/0x24)\n(SyS_clone) from (__sys_trace_return+0x0/0x10)\nCode: 0050a0e1 6c0080e2 0140a0e1 0260a0e1 (f801f0e7)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47618",
"url": "https://www.suse.com/security/cve/CVE-2021-47618"
},
{
"category": "external",
"summary": "SUSE Bug 1226644 for CVE-2021-47618",
"url": "https://bugzilla.suse.com/1226644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47618"
},
{
"cve": "CVE-2021-47619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47619"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix queues reservation for XDP\n\nWhen XDP was configured on a system with large number of CPUs\nand X722 NIC there was a call trace with NULL pointer dereference.\n\ni40e 0000:87:00.0: failed to get tracking for 256 queues for VSI 0 err -12\ni40e 0000:87:00.0: setup of MAIN VSI failed\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nRIP: 0010:i40e_xdp+0xea/0x1b0 [i40e]\nCall Trace:\n? i40e_reconfig_rss_queues+0x130/0x130 [i40e]\ndev_xdp_install+0x61/0xe0\ndev_xdp_attach+0x18a/0x4c0\ndev_change_xdp_fd+0x1e6/0x220\ndo_setlink+0x616/0x1030\n? ahci_port_stop+0x80/0x80\n? ata_qc_issue+0x107/0x1e0\n? lock_timer_base+0x61/0x80\n? __mod_timer+0x202/0x380\nrtnl_setlink+0xe5/0x170\n? bpf_lsm_binder_transaction+0x10/0x10\n? security_capable+0x36/0x50\nrtnetlink_rcv_msg+0x121/0x350\n? rtnl_calcit.isra.0+0x100/0x100\nnetlink_rcv_skb+0x50/0xf0\nnetlink_unicast+0x1d3/0x2a0\nnetlink_sendmsg+0x22a/0x440\nsock_sendmsg+0x5e/0x60\n__sys_sendto+0xf0/0x160\n? __sys_getsockname+0x7e/0xc0\n? _copy_from_user+0x3c/0x80\n? __sys_setsockopt+0xc8/0x1a0\n__x64_sys_sendto+0x20/0x30\ndo_syscall_64+0x33/0x40\nentry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f83fa7a39e0\n\nThis was caused by PF queue pile fragmentation due to\nflow director VSI queue being placed right after main VSI.\nBecause of this main VSI was not able to resize its\nqueue allocation for XDP resulting in no queues allocated\nfor main VSI when XDP was turned on.\n\nFix this by always allocating last queue in PF queue pile\nfor a flow director VSI.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47619",
"url": "https://www.suse.com/security/cve/CVE-2021-47619"
},
{
"category": "external",
"summary": "SUSE Bug 1226645 for CVE-2021-47619",
"url": "https://bugzilla.suse.com/1226645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2021-47619"
},
{
"cve": "CVE-2021-47620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47620"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: refactor malicious adv data check\n\nCheck for out-of-bound read was being performed at the end of while\nnum_reports loop, and would fill journal with false positives. Added\ncheck to beginning of loop processing so that it doesn\u0027t get checked\nafter ptr has been advanced.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47620",
"url": "https://www.suse.com/security/cve/CVE-2021-47620"
},
{
"category": "external",
"summary": "SUSE Bug 1226669 for CVE-2021-47620",
"url": "https://bugzilla.suse.com/1226669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "low"
}
],
"title": "CVE-2021-47620"
},
{
"cve": "CVE-2022-0435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0435"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0435",
"url": "https://www.suse.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "SUSE Bug 1195254 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1195254"
},
{
"category": "external",
"summary": "SUSE Bug 1195308 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1195308"
},
{
"category": "external",
"summary": "SUSE Bug 1226672 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1226672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2022-0435"
},
{
"cve": "CVE-2022-22942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22942"
}
],
"notes": [
{
"category": "general",
"text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22942",
"url": "https://www.suse.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "SUSE Bug 1195065 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "external",
"summary": "SUSE Bug 1195951 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2938"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2938",
"url": "https://www.suse.com/security/cve/CVE-2022-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1202623 for CVE-2022-2938",
"url": "https://bugzilla.suse.com/1202623"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-2938"
},
{
"cve": "CVE-2022-48711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48711"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: improve size validations for received domain records\n\nThe function tipc_mon_rcv() allows a node to receive and process\ndomain_record structs from peer nodes to track their views of the\nnetwork topology.\n\nThis patch verifies that the number of members in a received domain\nrecord does not exceed the limit defined by MAX_MON_DOMAIN, something\nthat may otherwise lead to a stack overflow.\n\ntipc_mon_rcv() is called from the function tipc_link_proto_rcv(), where\nwe are reading a 32 bit message data length field into a uint16. To\navert any risk of bit overflow, we add an extra sanity check for this in\nthat function. We cannot see that happen with the current code, but\nfuture designers being unaware of this risk, may introduce it by\nallowing delivery of very large (\u003e 64k) sk buffers from the bearer\nlayer. This potential problem was identified by Eric Dumazet.\n\nThis fixes CVE-2022-0435",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48711",
"url": "https://www.suse.com/security/cve/CVE-2022-48711"
},
{
"category": "external",
"summary": "SUSE Bug 1226672 for CVE-2022-48711",
"url": "https://bugzilla.suse.com/1226672"
},
{
"category": "external",
"summary": "SUSE Bug 1227473 for CVE-2022-48711",
"url": "https://bugzilla.suse.com/1227473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48711"
},
{
"cve": "CVE-2022-48715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48715"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Make bnx2fc_recv_frame() mp safe\n\nRunning tests with a debug kernel shows that bnx2fc_recv_frame() is\nmodifying the per_cpu lport stats counters in a non-mpsafe way. Just boot\na debug kernel and run the bnx2fc driver with the hardware enabled.\n\n[ 1391.699147] BUG: using smp_processor_id() in preemptible [00000000] code: bnx2fc_\n[ 1391.699160] caller is bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]\n[ 1391.699174] CPU: 2 PID: 4355 Comm: bnx2fc_l2_threa Kdump: loaded Tainted: G B\n[ 1391.699180] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013\n[ 1391.699183] Call Trace:\n[ 1391.699188] dump_stack_lvl+0x57/0x7d\n[ 1391.699198] check_preemption_disabled+0xc8/0xd0\n[ 1391.699205] bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]\n[ 1391.699215] ? do_raw_spin_trylock+0xb5/0x180\n[ 1391.699221] ? bnx2fc_npiv_create_vports.isra.0+0x4e0/0x4e0 [bnx2fc]\n[ 1391.699229] ? bnx2fc_l2_rcv_thread+0xb7/0x3a0 [bnx2fc]\n[ 1391.699240] bnx2fc_l2_rcv_thread+0x1af/0x3a0 [bnx2fc]\n[ 1391.699250] ? bnx2fc_ulp_init+0xc0/0xc0 [bnx2fc]\n[ 1391.699258] kthread+0x364/0x420\n[ 1391.699263] ? _raw_spin_unlock_irq+0x24/0x50\n[ 1391.699268] ? set_kthread_struct+0x100/0x100\n[ 1391.699273] ret_from_fork+0x22/0x30\n\nRestore the old get_cpu/put_cpu code with some modifications to reduce the\nsize of the critical section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48715",
"url": "https://www.suse.com/security/cve/CVE-2022-48715"
},
{
"category": "external",
"summary": "SUSE Bug 1226621 for CVE-2022-48715",
"url": "https://bugzilla.suse.com/1226621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "low"
}
],
"title": "CVE-2022-48715"
},
{
"cve": "CVE-2022-48717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48717"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: max9759: fix underflow in speaker_gain_control_put()\n\nCheck for negative values of \"priv-\u003egain\" to prevent an out of bounds\naccess. The concern is that these might come from the user via:\n -\u003e snd_ctl_elem_write_user()\n -\u003e snd_ctl_elem_write()\n -\u003e kctl-\u003eput()",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48717",
"url": "https://www.suse.com/security/cve/CVE-2022-48717"
},
{
"category": "external",
"summary": "SUSE Bug 1226679 for CVE-2022-48717",
"url": "https://bugzilla.suse.com/1226679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48717"
},
{
"cve": "CVE-2022-48722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ieee802154: ca8210: Stop leaking skb\u0027s\n\nUpon error the ieee802154_xmit_complete() helper is not called. Only\nieee802154_wake_queue() is called manually. We then leak the skb\nstructure.\n\nFree the skb structure upon error before returning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48722",
"url": "https://www.suse.com/security/cve/CVE-2022-48722"
},
{
"category": "external",
"summary": "SUSE Bug 1226619 for CVE-2022-48722",
"url": "https://bugzilla.suse.com/1226619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48722"
},
{
"cve": "CVE-2022-48724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48724"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()\n\nAfter commit e3beca48a45b (\"irqdomain/treewide: Keep firmware node\nunconditionally allocated\"). For tear down scenario, fn is only freed\nafter fail to allocate ir_domain, though it also should be freed in case\ndmar_enable_qi returns error.\n\nBesides free fn, irq_domain and ir_msi_domain need to be removed as well\nif intel_setup_irq_remapping fails to enable queued invalidation.\n\nImprove the rewinding path by add out_free_ir_domain and out_free_fwnode\nlables per Baolu\u0027s suggestion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48724",
"url": "https://www.suse.com/security/cve/CVE-2022-48724"
},
{
"category": "external",
"summary": "SUSE Bug 1226624 for CVE-2022-48724",
"url": "https://bugzilla.suse.com/1226624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48724"
},
{
"cve": "CVE-2022-48726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48726"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/ucma: Protect mc during concurrent multicast leaves\n\nPartially revert the commit mentioned in the Fixes line to make sure that\nallocation and erasing multicast struct are locked.\n\n BUG: KASAN: use-after-free in ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]\n BUG: KASAN: use-after-free in ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579\n Read of size 8 at addr ffff88801bb74b00 by task syz-executor.1/25529\n CPU: 0 PID: 25529 Comm: syz-executor.1 Not tainted 5.16.0-rc7-syzkaller #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\n Call Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247\n __kasan_report mm/kasan/report.c:433 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:450\n ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]\n ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579\n ucma_destroy_id+0x1e6/0x280 drivers/infiniband/core/ucma.c:614\n ucma_write+0x25c/0x350 drivers/infiniband/core/ucma.c:1732\n vfs_write+0x28e/0xae0 fs/read_write.c:588\n ksys_write+0x1ee/0x250 fs/read_write.c:643\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nCurrently the xarray search can touch a concurrently freeing mc as the\nxa_for_each() is not surrounded by any lock. Rather than hold the lock for\na full scan hold it only for the effected items, which is usually an empty\nlist.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48726",
"url": "https://www.suse.com/security/cve/CVE-2022-48726"
},
{
"category": "external",
"summary": "SUSE Bug 1226686 for CVE-2022-48726",
"url": "https://bugzilla.suse.com/1226686"
},
{
"category": "external",
"summary": "SUSE Bug 1227552 for CVE-2022-48726",
"url": "https://bugzilla.suse.com/1227552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48726"
},
{
"cve": "CVE-2022-48728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix AIP early init panic\n\nAn early failure in hfi1_ipoib_setup_rn() can lead to the following panic:\n\n BUG: unable to handle kernel NULL pointer dereference at 00000000000001b0\n PGD 0 P4D 0\n Oops: 0002 [#1] SMP NOPTI\n Workqueue: events work_for_cpu_fn\n RIP: 0010:try_to_grab_pending+0x2b/0x140\n Code: 1f 44 00 00 41 55 41 54 55 48 89 d5 53 48 89 fb 9c 58 0f 1f 44 00 00 48 89 c2 fa 66 0f 1f 44 00 00 48 89 55 00 40 84 f6 75 77 \u003cf0\u003e 48 0f ba 2b 00 72 09 31 c0 5b 5d 41 5c 41 5d c3 48 89 df e8 6c\n RSP: 0018:ffffb6b3cf7cfa48 EFLAGS: 00010046\n RAX: 0000000000000246 RBX: 00000000000001b0 RCX: 0000000000000000\n RDX: 0000000000000246 RSI: 0000000000000000 RDI: 00000000000001b0\n RBP: ffffb6b3cf7cfa70 R08: 0000000000000f09 R09: 0000000000000001\n R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000\n R13: ffffb6b3cf7cfa90 R14: ffffffff9b2fbfc0 R15: ffff8a4fdf244690\n FS: 0000000000000000(0000) GS:ffff8a527f400000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00000000000001b0 CR3: 00000017e2410003 CR4: 00000000007706f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n __cancel_work_timer+0x42/0x190\n ? dev_printk_emit+0x4e/0x70\n iowait_cancel_work+0x15/0x30 [hfi1]\n hfi1_ipoib_txreq_deinit+0x5a/0x220 [hfi1]\n ? dev_err+0x6c/0x90\n hfi1_ipoib_netdev_dtor+0x15/0x30 [hfi1]\n hfi1_ipoib_setup_rn+0x10e/0x150 [hfi1]\n rdma_init_netdev+0x5a/0x80 [ib_core]\n ? hfi1_ipoib_free_rdma_netdev+0x20/0x20 [hfi1]\n ipoib_intf_init+0x6c/0x350 [ib_ipoib]\n ipoib_intf_alloc+0x5c/0xc0 [ib_ipoib]\n ipoib_add_one+0xbe/0x300 [ib_ipoib]\n add_client_context+0x12c/0x1a0 [ib_core]\n enable_device_and_get+0xdc/0x1d0 [ib_core]\n ib_register_device+0x572/0x6b0 [ib_core]\n rvt_register_device+0x11b/0x220 [rdmavt]\n hfi1_register_ib_device+0x6b4/0x770 [hfi1]\n do_init_one.isra.20+0x3e3/0x680 [hfi1]\n local_pci_probe+0x41/0x90\n work_for_cpu_fn+0x16/0x20\n process_one_work+0x1a7/0x360\n ? create_worker+0x1a0/0x1a0\n worker_thread+0x1cf/0x390\n ? create_worker+0x1a0/0x1a0\n kthread+0x116/0x130\n ? kthread_flush_work_fn+0x10/0x10\n ret_from_fork+0x1f/0x40\n\nThe panic happens in hfi1_ipoib_txreq_deinit() because there is a NULL\nderef when hfi1_ipoib_netdev_dtor() is called in this error case.\n\nhfi1_ipoib_txreq_init() and hfi1_ipoib_rxq_init() are self unwinding so\nfix by adjusting the error paths accordingly.\n\nOther changes:\n- hfi1_ipoib_free_rdma_netdev() is deleted including the free_netdev()\n since the netdev core code deletes calls free_netdev()\n- The switch to the accelerated entrances is moved to the success path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48728",
"url": "https://www.suse.com/security/cve/CVE-2022-48728"
},
{
"category": "external",
"summary": "SUSE Bug 1226691 for CVE-2022-48728",
"url": "https://bugzilla.suse.com/1226691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48728"
},
{
"cve": "CVE-2022-48730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48730"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf: heaps: Fix potential spectre v1 gadget\n\nIt appears like nr could be a Spectre v1 gadget as it\u0027s supplied by a\nuser and used as an array index. Prevent the contents\nof kernel memory from being leaked to userspace via speculative\nexecution by using array_index_nospec.\n\n [sumits: added fixes and cc: stable tags]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48730",
"url": "https://www.suse.com/security/cve/CVE-2022-48730"
},
{
"category": "external",
"summary": "SUSE Bug 1226713 for CVE-2022-48730",
"url": "https://bugzilla.suse.com/1226713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48730"
},
{
"cve": "CVE-2022-48732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48732"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: fix off by one in BIOS boundary checking\n\nBounds checking when parsing init scripts embedded in the BIOS reject\naccess to the last byte. This causes driver initialization to fail on\nApple eMac\u0027s with GeForce 2 MX GPUs, leaving the system with no working\nconsole.\n\nThis is probably only seen on OpenFirmware machines like PowerPC Macs\nbecause the BIOS image provided by OF is only the used parts of the ROM,\nnot a power-of-two blocks read from PCI directly so PCs always have\nempty bytes at the end that are never accessed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48732",
"url": "https://www.suse.com/security/cve/CVE-2022-48732"
},
{
"category": "external",
"summary": "SUSE Bug 1226716 for CVE-2022-48732",
"url": "https://bugzilla.suse.com/1226716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48732"
},
{
"cve": "CVE-2022-48736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48736"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48736",
"url": "https://www.suse.com/security/cve/CVE-2022-48736"
},
{
"category": "external",
"summary": "SUSE Bug 1226721 for CVE-2022-48736",
"url": "https://bugzilla.suse.com/1226721"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "low"
}
],
"title": "CVE-2022-48736"
},
{
"cve": "CVE-2022-48737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48737"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48737",
"url": "https://www.suse.com/security/cve/CVE-2022-48737"
},
{
"category": "external",
"summary": "SUSE Bug 1226762 for CVE-2022-48737",
"url": "https://bugzilla.suse.com/1226762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "low"
}
],
"title": "CVE-2022-48737"
},
{
"cve": "CVE-2022-48738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48738"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: ops: Reject out of bounds values in snd_soc_put_volsw()\n\nWe don\u0027t currently validate that the values being set are within the range\nwe advertised to userspace as being valid, do so and reject any values\nthat are out of range.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48738",
"url": "https://www.suse.com/security/cve/CVE-2022-48738"
},
{
"category": "external",
"summary": "SUSE Bug 1226674 for CVE-2022-48738",
"url": "https://bugzilla.suse.com/1226674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48738"
},
{
"cve": "CVE-2022-48746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48746"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix handling of wrong devices during bond netevent\n\nCurrent implementation of bond netevent handler only check if\nthe handled netdev is VF representor and it missing a check if\nthe VF representor is on the same phys device of the bond handling\nthe netevent.\n\nFix by adding the missing check and optimizing the check if\nthe netdev is VF representor so it will not access uninitialized\nprivate data and crashes.\n\nBUG: kernel NULL pointer dereference, address: 000000000000036c\nPGD 0 P4D 0\nOops: 0000 [#1] SMP NOPTI\nWorkqueue: eth3bond0 bond_mii_monitor [bonding]\nRIP: 0010:mlx5e_is_uplink_rep+0xc/0x50 [mlx5_core]\nRSP: 0018:ffff88812d69fd60 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff8881cf800000 RCX: 0000000000000000\nRDX: ffff88812d69fe10 RSI: 000000000000001b RDI: ffff8881cf800880\nRBP: ffff8881cf800000 R08: 00000445cabccf2b R09: 0000000000000008\nR10: 0000000000000004 R11: 0000000000000008 R12: ffff88812d69fe10\nR13: 00000000fffffffe R14: ffff88820c0f9000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff88846fb00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000000000036c CR3: 0000000103d80006 CR4: 0000000000370ea0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n mlx5e_eswitch_uplink_rep+0x31/0x40 [mlx5_core]\n mlx5e_rep_is_lag_netdev+0x94/0xc0 [mlx5_core]\n mlx5e_rep_esw_bond_netevent+0xeb/0x3d0 [mlx5_core]\n raw_notifier_call_chain+0x41/0x60\n call_netdevice_notifiers_info+0x34/0x80\n netdev_lower_state_changed+0x4e/0xa0\n bond_mii_monitor+0x56b/0x640 [bonding]\n process_one_work+0x1b9/0x390\n worker_thread+0x4d/0x3d0\n ? rescuer_thread+0x350/0x350\n kthread+0x124/0x150\n ? set_kthread_struct+0x40/0x40\n ret_from_fork+0x1f/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48746",
"url": "https://www.suse.com/security/cve/CVE-2022-48746"
},
{
"category": "external",
"summary": "SUSE Bug 1226703 for CVE-2022-48746",
"url": "https://bugzilla.suse.com/1226703"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48746"
},
{
"cve": "CVE-2022-48747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48747"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: Fix wrong offset in bio_truncate()\n\nbio_truncate() clears the buffer outside of last block of bdev, however\ncurrent bio_truncate() is using the wrong offset of page. So it can\nreturn the uninitialized data.\n\nThis happened when both of truncated/corrupted FS and userspace (via\nbdev) are trying to read the last of bdev.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48747",
"url": "https://www.suse.com/security/cve/CVE-2022-48747"
},
{
"category": "external",
"summary": "SUSE Bug 1226643 for CVE-2022-48747",
"url": "https://bugzilla.suse.com/1226643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48747"
},
{
"cve": "CVE-2022-48748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48748"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: vlan: fix memory leak in __allowed_ingress\n\nWhen using per-vlan state, if vlan snooping and stats are disabled,\nuntagged or priority-tagged ingress frame will go to check pvid state.\nIf the port state is forwarding and the pvid state is not\nlearning/forwarding, untagged or priority-tagged frame will be dropped\nbut skb memory is not freed.\nShould free skb when __allowed_ingress returns false.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48748",
"url": "https://www.suse.com/security/cve/CVE-2022-48748"
},
{
"category": "external",
"summary": "SUSE Bug 1226647 for CVE-2022-48748",
"url": "https://bugzilla.suse.com/1226647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48748"
},
{
"cve": "CVE-2022-48749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48749"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc\n\nThe function performs a check on the \"ctx\" input parameter, however, it\nis used before the check.\n\nInitialize the \"base\" variable after the sanity check to avoid a\npossible NULL pointer dereference.\n\nAddresses-Coverity-ID: 1493866 (\"Null pointer dereference\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48749",
"url": "https://www.suse.com/security/cve/CVE-2022-48749"
},
{
"category": "external",
"summary": "SUSE Bug 1226650 for CVE-2022-48749",
"url": "https://bugzilla.suse.com/1226650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48749"
},
{
"cve": "CVE-2022-48752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending\n\nRunning selftest with CONFIG_PPC_IRQ_SOFT_MASK_DEBUG enabled in kernel\ntriggered below warning:\n\n[ 172.851380] ------------[ cut here ]------------\n[ 172.851391] WARNING: CPU: 8 PID: 2901 at arch/powerpc/include/asm/hw_irq.h:246 power_pmu_disable+0x270/0x280\n[ 172.851402] Modules linked in: dm_mod bonding nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables rfkill nfnetlink sunrpc xfs libcrc32c pseries_rng xts vmx_crypto uio_pdrv_genirq uio sch_fq_codel ip_tables ext4 mbcache jbd2 sd_mod t10_pi sg ibmvscsi ibmveth scsi_transport_srp fuse\n[ 172.851442] CPU: 8 PID: 2901 Comm: lost_exception_ Not tainted 5.16.0-rc5-03218-g798527287598 #2\n[ 172.851451] NIP: c00000000013d600 LR: c00000000013d5a4 CTR: c00000000013b180\n[ 172.851458] REGS: c000000017687860 TRAP: 0700 Not tainted (5.16.0-rc5-03218-g798527287598)\n[ 172.851465] MSR: 8000000000029033 \u003cSF,EE,ME,IR,DR,RI,LE\u003e CR: 48004884 XER: 20040000\n[ 172.851482] CFAR: c00000000013d5b4 IRQMASK: 1\n[ 172.851482] GPR00: c00000000013d5a4 c000000017687b00 c000000002a10600 0000000000000004\n[ 172.851482] GPR04: 0000000082004000 c0000008ba08f0a8 0000000000000000 00000008b7ed0000\n[ 172.851482] GPR08: 00000000446194f6 0000000000008000 c00000000013b118 c000000000d58e68\n[ 172.851482] GPR12: c00000000013d390 c00000001ec54a80 0000000000000000 0000000000000000\n[ 172.851482] GPR16: 0000000000000000 0000000000000000 c000000015d5c708 c0000000025396d0\n[ 172.851482] GPR20: 0000000000000000 0000000000000000 c00000000a3bbf40 0000000000000003\n[ 172.851482] GPR24: 0000000000000000 c0000008ba097400 c0000000161e0d00 c00000000a3bb600\n[ 172.851482] GPR28: c000000015d5c700 0000000000000001 0000000082384090 c0000008ba0020d8\n[ 172.851549] NIP [c00000000013d600] power_pmu_disable+0x270/0x280\n[ 172.851557] LR [c00000000013d5a4] power_pmu_disable+0x214/0x280\n[ 172.851565] Call Trace:\n[ 172.851568] [c000000017687b00] [c00000000013d5a4] power_pmu_disable+0x214/0x280 (unreliable)\n[ 172.851579] [c000000017687b40] [c0000000003403ac] perf_pmu_disable+0x4c/0x60\n[ 172.851588] [c000000017687b60] [c0000000003445e4] __perf_event_task_sched_out+0x1d4/0x660\n[ 172.851596] [c000000017687c50] [c000000000d1175c] __schedule+0xbcc/0x12a0\n[ 172.851602] [c000000017687d60] [c000000000d11ea8] schedule+0x78/0x140\n[ 172.851608] [c000000017687d90] [c0000000001a8080] sys_sched_yield+0x20/0x40\n[ 172.851615] [c000000017687db0] [c0000000000334dc] system_call_exception+0x18c/0x380\n[ 172.851622] [c000000017687e10] [c00000000000c74c] system_call_common+0xec/0x268\n\nThe warning indicates that MSR_EE being set(interrupt enabled) when\nthere was an overflown PMC detected. This could happen in\npower_pmu_disable since it runs under interrupt soft disable\ncondition ( local_irq_save ) and not with interrupts hard disabled.\ncommit 2c9ac51b850d (\"powerpc/perf: Fix PMU callbacks to clear\npending PMI before resetting an overflown PMC\") intended to clear\nPMI pending bit in Paca when disabling the PMU. It could happen\nthat PMC gets overflown while code is in power_pmu_disable\ncallback function. Hence add a check to see if PMI pending bit\nis set in Paca before clearing it via clear_pmi_pending.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48752",
"url": "https://www.suse.com/security/cve/CVE-2022-48752"
},
{
"category": "external",
"summary": "SUSE Bug 1226709 for CVE-2022-48752",
"url": "https://bugzilla.suse.com/1226709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48752"
},
{
"cve": "CVE-2022-48754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48754"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphylib: fix potential use-after-free\n\nCommit bafbdd527d56 (\"phylib: Add device reset GPIO support\") added call\nto phy_device_reset(phydev) after the put_device() call in phy_detach().\n\nThe comment before the put_device() call says that the phydev might go\naway with put_device().\n\nFix potential use-after-free by calling phy_device_reset() before\nput_device().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48754",
"url": "https://www.suse.com/security/cve/CVE-2022-48754"
},
{
"category": "external",
"summary": "SUSE Bug 1226692 for CVE-2022-48754",
"url": "https://bugzilla.suse.com/1226692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48754"
},
{
"cve": "CVE-2022-48756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48756"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dsi: invalid parameter check in msm_dsi_phy_enable\n\nThe function performs a check on the \"phy\" input parameter, however, it\nis used before the check.\n\nInitialize the \"dev\" variable after the sanity check to avoid a possible\nNULL pointer dereference.\n\nAddresses-Coverity-ID: 1493860 (\"Null pointer dereference\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48756",
"url": "https://www.suse.com/security/cve/CVE-2022-48756"
},
{
"category": "external",
"summary": "SUSE Bug 1226698 for CVE-2022-48756",
"url": "https://bugzilla.suse.com/1226698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48756"
},
{
"cve": "CVE-2022-48758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48758"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()\n\nThe bnx2fc_destroy() functions are removing the interface before calling\ndestroy_work. This results multiple WARNings from sysfs_remove_group() as\nthe controller rport device attributes are removed too early.\n\nReplace the fcoe_port\u0027s destroy_work queue. It\u0027s not needed.\n\nThe problem is easily reproducible with the following steps.\n\nExample:\n\n $ dmesg -w \u0026\n $ systemctl enable --now fcoe\n $ fipvlan -s -c ens2f1\n $ fcoeadm -d ens2f1.802\n [ 583.464488] host2: libfc: Link down on port (7500a1)\n [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!!\n [ 583.490468] ------------[ cut here ]------------\n [ 583.538725] sysfs group \u0027power\u0027 not found for kobject \u0027rport-2:0-0\u0027\n [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80\n [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ...\n [ 583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1\n [ 583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013\n [ 584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc]\n [ 584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80\n [ 584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ...\n [ 584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282\n [ 584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000\n [ 584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0\n [ 584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00\n [ 584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400\n [ 584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004\n [ 584.355379] FS: 0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000\n [ 584.394419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0\n [ 584.454888] Call Trace:\n [ 584.466108] device_del+0xb2/0x3e0\n [ 584.481701] device_unregister+0x13/0x60\n [ 584.501306] bsg_unregister_queue+0x5b/0x80\n [ 584.522029] bsg_remove_queue+0x1c/0x40\n [ 584.541884] fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc]\n [ 584.573823] process_one_work+0x1e3/0x3b0\n [ 584.592396] worker_thread+0x50/0x3b0\n [ 584.609256] ? rescuer_thread+0x370/0x370\n [ 584.628877] kthread+0x149/0x170\n [ 584.643673] ? set_kthread_struct+0x40/0x40\n [ 584.662909] ret_from_fork+0x22/0x30\n [ 584.680002] ---[ end trace 53575ecefa942ece ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48758",
"url": "https://www.suse.com/security/cve/CVE-2022-48758"
},
{
"category": "external",
"summary": "SUSE Bug 1226708 for CVE-2022-48758",
"url": "https://bugzilla.suse.com/1226708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48758"
},
{
"cve": "CVE-2022-48759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48759"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev\n\nstruct rpmsg_ctrldev contains a struct cdev. The current code frees\nthe rpmsg_ctrldev struct in rpmsg_ctrldev_release_device(), but the\ncdev is a managed object, therefore its release is not predictable\nand the rpmsg_ctrldev could be freed before the cdev is entirely\nreleased, as in the backtrace below.\n\n[ 93.625603] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x7c\n[ 93.636115] WARNING: CPU: 0 PID: 12 at lib/debugobjects.c:488 debug_print_object+0x13c/0x1b0\n[ 93.644799] Modules linked in: veth xt_cgroup xt_MASQUERADE rfcomm algif_hash algif_skcipher af_alg uinput ip6table_nat fuse uvcvideo videobuf2_vmalloc venus_enc venus_dec videobuf2_dma_contig hci_uart btandroid btqca snd_soc_rt5682_i2c bluetooth qcom_spmi_temp_alarm snd_soc_rt5682v\n[ 93.715175] CPU: 0 PID: 12 Comm: kworker/0:1 Tainted: G B 5.4.163-lockdep #26\n[ 93.723855] Hardware name: Google Lazor (rev3 - 8) with LTE (DT)\n[ 93.730055] Workqueue: events kobject_delayed_cleanup\n[ 93.735271] pstate: 60c00009 (nZCv daif +PAN +UAO)\n[ 93.740216] pc : debug_print_object+0x13c/0x1b0\n[ 93.744890] lr : debug_print_object+0x13c/0x1b0\n[ 93.749555] sp : ffffffacf5bc7940\n[ 93.752978] x29: ffffffacf5bc7940 x28: dfffffd000000000\n[ 93.758448] x27: ffffffacdb11a800 x26: dfffffd000000000\n[ 93.763916] x25: ffffffd0734f856c x24: dfffffd000000000\n[ 93.769389] x23: 0000000000000000 x22: ffffffd0733c35b0\n[ 93.774860] x21: ffffffd0751994a0 x20: ffffffd075ec27c0\n[ 93.780338] x19: ffffffd075199100 x18: 00000000000276e0\n[ 93.785814] x17: 0000000000000000 x16: dfffffd000000000\n[ 93.791291] x15: ffffffffffffffff x14: 6e6968207473696c\n[ 93.796768] x13: 0000000000000000 x12: ffffffd075e2b000\n[ 93.802244] x11: 0000000000000001 x10: 0000000000000000\n[ 93.807723] x9 : d13400dff1921900 x8 : d13400dff1921900\n[ 93.813200] x7 : 0000000000000000 x6 : 0000000000000000\n[ 93.818676] x5 : 0000000000000080 x4 : 0000000000000000\n[ 93.824152] x3 : ffffffd0732a0fa4 x2 : 0000000000000001\n[ 93.829628] x1 : ffffffacf5bc7580 x0 : 0000000000000061\n[ 93.835104] Call trace:\n[ 93.837644] debug_print_object+0x13c/0x1b0\n[ 93.841963] __debug_check_no_obj_freed+0x25c/0x3c0\n[ 93.846987] debug_check_no_obj_freed+0x18/0x20\n[ 93.851669] slab_free_freelist_hook+0xbc/0x1e4\n[ 93.856346] kfree+0xfc/0x2f4\n[ 93.859416] rpmsg_ctrldev_release_device+0x78/0xb8\n[ 93.864445] device_release+0x84/0x168\n[ 93.868310] kobject_cleanup+0x12c/0x298\n[ 93.872356] kobject_delayed_cleanup+0x10/0x18\n[ 93.876948] process_one_work+0x578/0x92c\n[ 93.881086] worker_thread+0x804/0xcf8\n[ 93.884963] kthread+0x2a8/0x314\n[ 93.888303] ret_from_fork+0x10/0x18\n\nThe cdev_device_add/del() API was created to address this issue (see\ncommit \u0027233ed09d7fda (\"chardev: add helper function to register char\ndevs with a struct device\")\u0027), use it instead of cdev add/del().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48759",
"url": "https://www.suse.com/security/cve/CVE-2022-48759"
},
{
"category": "external",
"summary": "SUSE Bug 1226711 for CVE-2022-48759",
"url": "https://bugzilla.suse.com/1226711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48759"
},
{
"cve": "CVE-2022-48760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48760"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix hang in usb_kill_urb by adding memory barriers\n\nThe syzbot fuzzer has identified a bug in which processes hang waiting\nfor usb_kill_urb() to return. It turns out the issue is not unlinking\nthe URB; that works just fine. Rather, the problem arises when the\nwakeup notification that the URB has completed is not received.\n\nThe reason is memory-access ordering on SMP systems. In outline form,\nusb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on\ndifferent CPUs perform the following actions:\n\nCPU 0\t\t\t\t\tCPU 1\n----------------------------\t\t---------------------------------\nusb_kill_urb():\t\t\t\t__usb_hcd_giveback_urb():\n ...\t\t\t\t\t ...\n atomic_inc(\u0026urb-\u003ereject);\t\t atomic_dec(\u0026urb-\u003euse_count);\n ...\t\t\t\t\t ...\n wait_event(usb_kill_urb_queue,\n\tatomic_read(\u0026urb-\u003euse_count) == 0);\n\t\t\t\t\t if (atomic_read(\u0026urb-\u003ereject))\n\t\t\t\t\t\twake_up(\u0026usb_kill_urb_queue);\n\nConfining your attention to urb-\u003ereject and urb-\u003euse_count, you can\nsee that the overall pattern of accesses on CPU 0 is:\n\n\twrite urb-\u003ereject, then read urb-\u003euse_count;\n\nwhereas the overall pattern of accesses on CPU 1 is:\n\n\twrite urb-\u003euse_count, then read urb-\u003ereject.\n\nThis pattern is referred to in memory-model circles as SB (for \"Store\nBuffering\"), and it is well known that without suitable enforcement of\nthe desired order of accesses -- in the form of memory barriers -- it\nis entirely possible for one or both CPUs to execute their reads ahead\nof their writes. The end result will be that sometimes CPU 0 sees the\nold un-decremented value of urb-\u003euse_count while CPU 1 sees the old\nun-incremented value of urb-\u003ereject. Consequently CPU 0 ends up on\nthe wait queue and never gets woken up, leading to the observed hang\nin usb_kill_urb().\n\nThe same pattern of accesses occurs in usb_poison_urb() and the\nfailure pathway of usb_hcd_submit_urb().\n\nThe problem is fixed by adding suitable memory barriers. To provide\nproper memory-access ordering in the SB pattern, a full barrier is\nrequired on both CPUs. The atomic_inc() and atomic_dec() accesses\nthemselves don\u0027t provide any memory ordering, but since they are\npresent, we can use the optimized smp_mb__after_atomic() memory\nbarrier in the various routines to obtain the desired effect.\n\nThis patch adds the necessary memory barriers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48760",
"url": "https://www.suse.com/security/cve/CVE-2022-48760"
},
{
"category": "external",
"summary": "SUSE Bug 1226712 for CVE-2022-48760",
"url": "https://bugzilla.suse.com/1226712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48760"
},
{
"cve": "CVE-2022-48767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48767"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: properly put ceph_string reference after async create attempt\n\nThe reference acquired by try_prep_async_create is currently leaked.\nEnsure we put it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48767",
"url": "https://www.suse.com/security/cve/CVE-2022-48767"
},
{
"category": "external",
"summary": "SUSE Bug 1226715 for CVE-2022-48767",
"url": "https://bugzilla.suse.com/1226715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48767"
},
{
"cve": "CVE-2022-48768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48768"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/histogram: Fix a potential memory leak for kstrdup()\n\nkfree() is missing on an error path to free the memory allocated by\nkstrdup():\n\n p = param = kstrdup(data-\u003eparams[i], GFP_KERNEL);\n\nSo it is better to free it via kfree(p).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48768",
"url": "https://www.suse.com/security/cve/CVE-2022-48768"
},
{
"category": "external",
"summary": "SUSE Bug 1226720 for CVE-2022-48768",
"url": "https://bugzilla.suse.com/1226720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48768"
},
{
"cve": "CVE-2022-48771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48771"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix stale file descriptors on failed usercopy\n\nA failing usercopy of the fence_rep object will lead to a stale entry in\nthe file descriptor table as put_unused_fd() won\u0027t release it. This\nenables userland to refer to a dangling \u0027file\u0027 object through that still\nvalid file descriptor, leading to all kinds of use-after-free\nexploitation scenarios.\n\nFix this by deferring the call to fd_install() until after the usercopy\nhas succeeded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48771",
"url": "https://www.suse.com/security/cve/CVE-2022-48771"
},
{
"category": "external",
"summary": "SUSE Bug 1226732 for CVE-2022-48771",
"url": "https://bugzilla.suse.com/1226732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2022-48771"
},
{
"cve": "CVE-2023-24023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-24023"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-24023",
"url": "https://www.suse.com/security/cve/CVE-2023-24023"
},
{
"category": "external",
"summary": "SUSE Bug 1218148 for CVE-2023-24023",
"url": "https://bugzilla.suse.com/1218148"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2023-52707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52707"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/psi: Fix use-after-free in ep_remove_wait_queue()\n\nIf a non-root cgroup gets removed when there is a thread that registered\ntrigger and is polling on a pressure file within the cgroup, the polling\nwaitqueue gets freed in the following path:\n\n do_rmdir\n cgroup_rmdir\n kernfs_drain_open_files\n cgroup_file_release\n cgroup_pressure_release\n psi_trigger_destroy\n\nHowever, the polling thread still has a reference to the pressure file and\nwill access the freed waitqueue when the file is closed or upon exit:\n\n fput\n ep_eventpoll_release\n ep_free\n ep_remove_wait_queue\n remove_wait_queue\n\nThis results in use-after-free as pasted below.\n\nThe fundamental problem here is that cgroup_file_release() (and\nconsequently waitqueue\u0027s lifetime) is not tied to the file\u0027s real lifetime.\nUsing wake_up_pollfree() here might be less than ideal, but it is in line\nwith the comment at commit 42288cb44c4b (\"wait: add wake_up_pollfree()\")\nsince the waitqueue\u0027s lifetime is not tied to file\u0027s one and can be\nconsidered as another special case. While this would be fixable by somehow\nmaking cgroup_file_release() be tied to the fput(), it would require\nsizable refactoring at cgroups or higher layer which might be more\njustifiable if we identify more cases like this.\n\n BUG: KASAN: use-after-free in _raw_spin_lock_irqsave+0x60/0xc0\n Write of size 4 at addr ffff88810e625328 by task a.out/4404\n\n\tCPU: 19 PID: 4404 Comm: a.out Not tainted 6.2.0-rc6 #38\n\tHardware name: Amazon EC2 c5a.8xlarge/, BIOS 1.0 10/16/2017\n\tCall Trace:\n\t\u003cTASK\u003e\n\tdump_stack_lvl+0x73/0xa0\n\tprint_report+0x16c/0x4e0\n\tkasan_report+0xc3/0xf0\n\tkasan_check_range+0x2d2/0x310\n\t_raw_spin_lock_irqsave+0x60/0xc0\n\tremove_wait_queue+0x1a/0xa0\n\tep_free+0x12c/0x170\n\tep_eventpoll_release+0x26/0x30\n\t__fput+0x202/0x400\n\ttask_work_run+0x11d/0x170\n\tdo_exit+0x495/0x1130\n\tdo_group_exit+0x100/0x100\n\tget_signal+0xd67/0xde0\n\tarch_do_signal_or_restart+0x2a/0x2b0\n\texit_to_user_mode_prepare+0x94/0x100\n\tsyscall_exit_to_user_mode+0x20/0x40\n\tdo_syscall_64+0x52/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\t\u003c/TASK\u003e\n\n Allocated by task 4404:\n\n\tkasan_set_track+0x3d/0x60\n\t__kasan_kmalloc+0x85/0x90\n\tpsi_trigger_create+0x113/0x3e0\n\tpressure_write+0x146/0x2e0\n\tcgroup_file_write+0x11c/0x250\n\tkernfs_fop_write_iter+0x186/0x220\n\tvfs_write+0x3d8/0x5c0\n\tksys_write+0x90/0x110\n\tdo_syscall_64+0x43/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\n Freed by task 4407:\n\n\tkasan_set_track+0x3d/0x60\n\tkasan_save_free_info+0x27/0x40\n\t____kasan_slab_free+0x11d/0x170\n\tslab_free_freelist_hook+0x87/0x150\n\t__kmem_cache_free+0xcb/0x180\n\tpsi_trigger_destroy+0x2e8/0x310\n\tcgroup_file_release+0x4f/0xb0\n\tkernfs_drain_open_files+0x165/0x1f0\n\tkernfs_drain+0x162/0x1a0\n\t__kernfs_remove+0x1fb/0x310\n\tkernfs_remove_by_name_ns+0x95/0xe0\n\tcgroup_addrm_files+0x67f/0x700\n\tcgroup_destroy_locked+0x283/0x3c0\n\tcgroup_rmdir+0x29/0x100\n\tkernfs_iop_rmdir+0xd1/0x140\n\tvfs_rmdir+0xfe/0x240\n\tdo_rmdir+0x13d/0x280\n\t__x64_sys_rmdir+0x2c/0x30\n\tdo_syscall_64+0x43/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52707",
"url": "https://www.suse.com/security/cve/CVE-2023-52707"
},
{
"category": "external",
"summary": "SUSE Bug 1225109 for CVE-2023-52707",
"url": "https://bugzilla.suse.com/1225109"
},
{
"category": "external",
"summary": "SUSE Bug 1225190 for CVE-2023-52707",
"url": "https://bugzilla.suse.com/1225190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2023-52707"
},
{
"cve": "CVE-2023-52752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free bug in cifs_debug_data_proc_show()\n\nSkip SMB sessions that are being teared down\n(e.g. @ses-\u003eses_status == SES_EXITING) in cifs_debug_data_proc_show()\nto avoid use-after-free in @ses.\n\nThis fixes the following GPF when reading from /proc/fs/cifs/DebugData\nwhile mounting and umounting\n\n [ 816.251274] general protection fault, probably for non-canonical\n address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI\n ...\n [ 816.260138] Call Trace:\n [ 816.260329] \u003cTASK\u003e\n [ 816.260499] ? die_addr+0x36/0x90\n [ 816.260762] ? exc_general_protection+0x1b3/0x410\n [ 816.261126] ? asm_exc_general_protection+0x26/0x30\n [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs]\n [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs]\n [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs]\n [ 816.262689] ? seq_read_iter+0x379/0x470\n [ 816.262995] seq_read_iter+0x118/0x470\n [ 816.263291] proc_reg_read_iter+0x53/0x90\n [ 816.263596] ? srso_alias_return_thunk+0x5/0x7f\n [ 816.263945] vfs_read+0x201/0x350\n [ 816.264211] ksys_read+0x75/0x100\n [ 816.264472] do_syscall_64+0x3f/0x90\n [ 816.264750] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n [ 816.265135] RIP: 0033:0x7fd5e669d381",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52752",
"url": "https://www.suse.com/security/cve/CVE-2023-52752"
},
{
"category": "external",
"summary": "SUSE Bug 1225487 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "external",
"summary": "SUSE Bug 1225819 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2023-52752"
},
{
"cve": "CVE-2023-52881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52881"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: do not accept ACK of bytes we never sent\n\nThis patch is based on a detailed report and ideas from Yepeng Pan\nand Christian Rossow.\n\nACK seq validation is currently following RFC 5961 5.2 guidelines:\n\n The ACK value is considered acceptable only if\n it is in the range of ((SND.UNA - MAX.SND.WND) \u003c= SEG.ACK \u003c=\n SND.NXT). All incoming segments whose ACK value doesn\u0027t satisfy the\n above condition MUST be discarded and an ACK sent back. It needs to\n be noted that RFC 793 on page 72 (fifth check) says: \"If the ACK is a\n duplicate (SEG.ACK \u003c SND.UNA), it can be ignored. If the ACK\n acknowledges something not yet sent (SEG.ACK \u003e SND.NXT) then send an\n ACK, drop the segment, and return\". The \"ignored\" above implies that\n the processing of the incoming data segment continues, which means\n the ACK value is treated as acceptable. This mitigation makes the\n ACK check more stringent since any ACK \u003c SND.UNA wouldn\u0027t be\n accepted, instead only ACKs that are in the range ((SND.UNA -\n MAX.SND.WND) \u003c= SEG.ACK \u003c= SND.NXT) get through.\n\nThis can be refined for new (and possibly spoofed) flows,\nby not accepting ACK for bytes that were never sent.\n\nThis greatly improves TCP security at a little cost.\n\nI added a Fixes: tag to make sure this patch will reach stable trees,\neven if the \u0027blamed\u0027 patch was adhering to the RFC.\n\ntp-\u003ebytes_acked was added in linux-4.2\n\nFollowing packetdrill test (courtesy of Yepeng Pan) shows\nthe issue at hand:\n\n0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3\n+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0\n+0 bind(3, ..., ...) = 0\n+0 listen(3, 1024) = 0\n\n// ---------------- Handshake ------------------- //\n\n// when window scale is set to 14 the window size can be extended to\n// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet\n// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)\n// ,though this ack number acknowledges some data never\n// sent by the server.\n\n+0 \u003c S 0:0(0) win 65535 \u003cmss 1400,nop,wscale 14\u003e\n+0 \u003e S. 0:0(0) ack 1 \u003c...\u003e\n+0 \u003c . 1:1(0) ack 1 win 65535\n+0 accept(3, ..., ...) = 4\n\n// For the established connection, we send an ACK packet,\n// the ack packet uses ack number 1 - 1073725300 + 2^32,\n// where 2^32 is used to wrap around.\n// Note: we used 1073725300 instead of 1073725440 to avoid possible\n// edge cases.\n// 1 - 1073725300 + 2^32 = 3221241997\n\n// Oops, old kernels happily accept this packet.\n+0 \u003c . 1:1001(1000) ack 3221241997 win 65535\n\n// After the kernel fix the following will be replaced by a challenge ACK,\n// and prior malicious frame would be dropped.\n+0 \u003e . 1:1(0) ack 1001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52881",
"url": "https://www.suse.com/security/cve/CVE-2023-52881"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1225611 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "external",
"summary": "SUSE Bug 1226152 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1226152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2023-52881"
},
{
"cve": "CVE-2024-26822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: set correct id, uid and cruid for multiuser automounts\n\nWhen uid, gid and cruid are not specified, we need to dynamically\nset them into the filesystem context used for automounting otherwise\nthey\u0027ll end up reusing the values from the parent mount.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26822",
"url": "https://www.suse.com/security/cve/CVE-2024-26822"
},
{
"category": "external",
"summary": "SUSE Bug 1223011 for CVE-2024-26822",
"url": "https://bugzilla.suse.com/1223011"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-26822"
},
{
"cve": "CVE-2024-26923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix garbage collector racing against connect()\n\nGarbage collector does not take into account the risk of embryo getting\nenqueued during the garbage collection. If such embryo has a peer that\ncarries SCM_RIGHTS, two consecutive passes of scan_children() may see a\ndifferent set of children. Leading to an incorrectly elevated inflight\ncount, and then a dangling pointer within the gc_inflight_list.\n\nsockets are AF_UNIX/SOCK_STREAM\nS is an unconnected socket\nL is a listening in-flight socket bound to addr, not in fdtable\nV\u0027s fd will be passed via sendmsg(), gets inflight count bumped\n\nconnect(S, addr)\tsendmsg(S, [V]); close(V)\t__unix_gc()\n----------------\t-------------------------\t-----------\n\nNS = unix_create1()\nskb1 = sock_wmalloc(NS)\nL = unix_find_other(addr)\nunix_state_lock(L)\nunix_peer(S) = NS\n\t\t\t// V count=1 inflight=0\n\n \t\t\tNS = unix_peer(S)\n \t\t\tskb2 = sock_alloc()\n\t\t\tskb_queue_tail(NS, skb2[V])\n\n\t\t\t// V became in-flight\n\t\t\t// V count=2 inflight=1\n\n\t\t\tclose(V)\n\n\t\t\t// V count=1 inflight=1\n\t\t\t// GC candidate condition met\n\n\t\t\t\t\t\tfor u in gc_inflight_list:\n\t\t\t\t\t\t if (total_refs == inflight_refs)\n\t\t\t\t\t\t add u to gc_candidates\n\n\t\t\t\t\t\t// gc_candidates={L, V}\n\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t scan_children(u, dec_inflight)\n\n\t\t\t\t\t\t// embryo (skb1) was not\n\t\t\t\t\t\t// reachable from L yet, so V\u0027s\n\t\t\t\t\t\t// inflight remains unchanged\n__skb_queue_tail(L, skb1)\nunix_state_unlock(L)\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t if (u.inflight)\n\t\t\t\t\t\t scan_children(u, inc_inflight_move_tail)\n\n\t\t\t\t\t\t// V count=1 inflight=2 (!)\n\nIf there is a GC-candidate listening socket, lock/unlock its state. This\nmakes GC wait until the end of any ongoing connect() to that socket. After\nflipping the lock, a possibly SCM-laden embryo is already enqueued. And if\nthere is another embryo coming, it can not possibly carry SCM_RIGHTS. At\nthis point, unix_inflight() can not happen because unix_gc_lock is already\ntaken. Inflight graph remains unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26923",
"url": "https://www.suse.com/security/cve/CVE-2024-26923"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-26923",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1223683 for CVE-2024-26923",
"url": "https://bugzilla.suse.com/1223683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-26923"
},
{
"cve": "CVE-2024-35789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35789"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\n\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\nfast_rx entry still holds a pointer to the VLAN\u0027s netdev, which can cause\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\nafter the VLAN change.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35789",
"url": "https://www.suse.com/security/cve/CVE-2024-35789"
},
{
"category": "external",
"summary": "SUSE Bug 1224749 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "external",
"summary": "SUSE Bug 1227320 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1227320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35861"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35861",
"url": "https://www.suse.com/security/cve/CVE-2024-35861"
},
{
"category": "external",
"summary": "SUSE Bug 1224766 for CVE-2024-35861",
"url": "https://bugzilla.suse.com/1224766"
},
{
"category": "external",
"summary": "SUSE Bug 1225312 for CVE-2024-35861",
"url": "https://bugzilla.suse.com/1225312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2024-35861"
},
{
"cve": "CVE-2024-35862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35862"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_network_name_deleted()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35862",
"url": "https://www.suse.com/security/cve/CVE-2024-35862"
},
{
"category": "external",
"summary": "SUSE Bug 1224764 for CVE-2024-35862",
"url": "https://bugzilla.suse.com/1224764"
},
{
"category": "external",
"summary": "SUSE Bug 1225311 for CVE-2024-35862",
"url": "https://bugzilla.suse.com/1225311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2024-35862"
},
{
"cve": "CVE-2024-35864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35864"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_valid_lease_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35864",
"url": "https://www.suse.com/security/cve/CVE-2024-35864"
},
{
"category": "external",
"summary": "SUSE Bug 1224765 for CVE-2024-35864",
"url": "https://bugzilla.suse.com/1224765"
},
{
"category": "external",
"summary": "SUSE Bug 1225309 for CVE-2024-35864",
"url": "https://bugzilla.suse.com/1225309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2024-35864"
},
{
"cve": "CVE-2024-35878",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35878"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: prevent NULL pointer dereference in vsnprintf()\n\nIn of_modalias(), we can get passed the str and len parameters which would\ncause a kernel oops in vsnprintf() since it only allows passing a NULL ptr\nwhen the length is also 0. Also, we need to filter out the negative values\nof the len parameter as these will result in a really huge buffer since\nsnprintf() takes size_t parameter while ours is ssize_t...\n\nFound by Linux Verification Center (linuxtesting.org) with the Svace static\nanalysis tool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35878",
"url": "https://www.suse.com/security/cve/CVE-2024-35878"
},
{
"category": "external",
"summary": "SUSE Bug 1224671 for CVE-2024-35878",
"url": "https://bugzilla.suse.com/1224671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-35878"
},
{
"cve": "CVE-2024-35950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35950"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fully protect modes[] with dev-\u003emode_config.mutex\n\nThe modes[] array contains pointers to modes on the connectors\u0027\nmode lists, which are protected by dev-\u003emode_config.mutex.\nThus we need to extend modes[] the same protection or by the\ntime we use it the elements may already be pointing to\nfreed/reused memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35950",
"url": "https://www.suse.com/security/cve/CVE-2024-35950"
},
{
"category": "external",
"summary": "SUSE Bug 1224703 for CVE-2024-35950",
"url": "https://bugzilla.suse.com/1224703"
},
{
"category": "external",
"summary": "SUSE Bug 1225310 for CVE-2024-35950",
"url": "https://bugzilla.suse.com/1225310"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-35950"
},
{
"cve": "CVE-2024-36894",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36894"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete\n\nFFS based applications can utilize the aio_cancel() callback to dequeue\npending USB requests submitted to the UDC. There is a scenario where the\nFFS application issues an AIO cancel call, while the UDC is handling a\nsoft disconnect. For a DWC3 based implementation, the callstack looks\nlike the following:\n\n DWC3 Gadget FFS Application\ndwc3_gadget_soft_disconnect() ...\n --\u003e dwc3_stop_active_transfers()\n --\u003e dwc3_gadget_giveback(-ESHUTDOWN)\n --\u003e ffs_epfile_async_io_complete() ffs_aio_cancel()\n --\u003e usb_ep_free_request() --\u003e usb_ep_dequeue()\n\nThere is currently no locking implemented between the AIO completion\nhandler and AIO cancel, so the issue occurs if the completion routine is\nrunning in parallel to an AIO cancel call coming from the FFS application.\nAs the completion call frees the USB request (io_data-\u003ereq) the FFS\napplication is also referencing it for the usb_ep_dequeue() call. This can\nlead to accessing a stale/hanging pointer.\n\ncommit b566d38857fc (\"usb: gadget: f_fs: use io_data-\u003estatus consistently\")\nrelocated the usb_ep_free_request() into ffs_epfile_async_io_complete().\nHowever, in order to properly implement locking to mitigate this issue, the\nspinlock can\u0027t be added to ffs_epfile_async_io_complete(), as\nusb_ep_dequeue() (if successfully dequeuing a USB request) will call the\nfunction driver\u0027s completion handler in the same context. Hence, leading\ninto a deadlock.\n\nFix this issue by moving the usb_ep_free_request() back to\nffs_user_copy_worker(), and ensuring that it explicitly sets io_data-\u003ereq\nto NULL after freeing it within the ffs-\u003eeps_lock. This resolves the race\ncondition above, as the ffs_aio_cancel() routine will not continue\nattempting to dequeue a request that has already been freed, or the\nffs_user_copy_work() not freeing the USB request until the AIO cancel is\ndone referencing it.\n\nThis fix depends on\n commit b566d38857fc (\"usb: gadget: f_fs: use io_data-\u003estatus\n consistently\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36894",
"url": "https://www.suse.com/security/cve/CVE-2024-36894"
},
{
"category": "external",
"summary": "SUSE Bug 1225749 for CVE-2024-36894",
"url": "https://bugzilla.suse.com/1225749"
},
{
"category": "external",
"summary": "SUSE Bug 1226139 for CVE-2024-36894",
"url": "https://bugzilla.suse.com/1226139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-36894"
},
{
"cve": "CVE-2024-36904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36904"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Use refcount_inc_not_zero() in tcp_twsk_unique().\n\nAnderson Nascimento reported a use-after-free splat in tcp_twsk_unique()\nwith nice analysis.\n\nSince commit ec94c2696f0b (\"tcp/dccp: avoid one atomic operation for\ntimewait hashdance\"), inet_twsk_hashdance() sets TIME-WAIT socket\u0027s\nsk_refcnt after putting it into ehash and releasing the bucket lock.\n\nThus, there is a small race window where other threads could try to\nreuse the port during connect() and call sock_hold() in tcp_twsk_unique()\nfor the TIME-WAIT socket with zero refcnt.\n\nIf that happens, the refcnt taken by tcp_twsk_unique() is overwritten\nand sock_put() will cause underflow, triggering a real use-after-free\nsomewhere else.\n\nTo avoid the use-after-free, we need to use refcount_inc_not_zero() in\ntcp_twsk_unique() and give up on reusing the port if it returns false.\n\n[0]:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110\nCPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1\nHardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023\nRIP: 0010:refcount_warn_saturate+0xe5/0x110\nCode: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff \u003c0f\u003e 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8\nRSP: 0018:ffffc90006b43b60 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027\nRDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0\nRBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0\nR10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84\nR13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0\nFS: 00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? refcount_warn_saturate+0xe5/0x110\n ? __warn+0x81/0x130\n ? refcount_warn_saturate+0xe5/0x110\n ? report_bug+0x171/0x1a0\n ? refcount_warn_saturate+0xe5/0x110\n ? handle_bug+0x3c/0x80\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? refcount_warn_saturate+0xe5/0x110\n tcp_twsk_unique+0x186/0x190\n __inet_check_established+0x176/0x2d0\n __inet_hash_connect+0x74/0x7d0\n ? __pfx___inet_check_established+0x10/0x10\n tcp_v4_connect+0x278/0x530\n __inet_stream_connect+0x10f/0x3d0\n inet_stream_connect+0x3a/0x60\n __sys_connect+0xa8/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0x83/0x170\n entry_SYSCALL_64_after_hwframe+0x78/0x80\nRIP: 0033:0x7f62c11a885d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48\nRSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d\nRDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003\nRBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0\nR13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36904",
"url": "https://www.suse.com/security/cve/CVE-2024-36904"
},
{
"category": "external",
"summary": "SUSE Bug 1225732 for CVE-2024-36904",
"url": "https://bugzilla.suse.com/1225732"
},
{
"category": "external",
"summary": "SUSE Bug 1225733 for CVE-2024-36904",
"url": "https://bugzilla.suse.com/1225733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-36904"
},
{
"cve": "CVE-2024-36940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36940"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: core: delete incorrect free in pinctrl_enable()\n\nThe \"pctldev\" struct is allocated in devm_pinctrl_register_and_init().\nIt\u0027s a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),\nso freeing it in pinctrl_enable() will lead to a double free.\n\nThe devm_pinctrl_dev_release() function frees the pindescs and destroys\nthe mutex as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36940",
"url": "https://www.suse.com/security/cve/CVE-2024-36940"
},
{
"category": "external",
"summary": "SUSE Bug 1225840 for CVE-2024-36940",
"url": "https://bugzilla.suse.com/1225840"
},
{
"category": "external",
"summary": "SUSE Bug 1225841 for CVE-2024-36940",
"url": "https://bugzilla.suse.com/1225841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000\u0027s perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36964",
"url": "https://www.suse.com/security/cve/CVE-2024-36964"
},
{
"category": "external",
"summary": "SUSE Bug 1225866 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "external",
"summary": "SUSE Bug 1226325 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1226325"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "important"
}
],
"title": "CVE-2024-36964"
},
{
"cve": "CVE-2024-38541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38541"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: add buffer overflow check in of_modalias()\n\nIn of_modalias(), if the buffer happens to be too small even for the 1st\nsnprintf() call, the len parameter will become negative and str parameter\n(if not NULL initially) will point beyond the buffer\u0027s end. Add the buffer\noverflow check after the 1st snprintf() call and fix such check after the\nstrlen() call (accounting for the terminating NUL char).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38541",
"url": "https://www.suse.com/security/cve/CVE-2024-38541"
},
{
"category": "external",
"summary": "SUSE Bug 1226587 for CVE-2024-38541",
"url": "https://bugzilla.suse.com/1226587"
},
{
"category": "external",
"summary": "SUSE Bug 1227496 for CVE-2024-38541",
"url": "https://bugzilla.suse.com/1227496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-38541"
},
{
"cve": "CVE-2024-38545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38545"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix UAF for cq async event\n\nThe refcount of CQ is not protected by locks. When CQ asynchronous\nevents and CQ destruction are concurrent, CQ may have been released,\nwhich will cause UAF.\n\nUse the xa_lock() to protect the CQ refcount.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38545",
"url": "https://www.suse.com/security/cve/CVE-2024-38545"
},
{
"category": "external",
"summary": "SUSE Bug 1226595 for CVE-2024-38545",
"url": "https://bugzilla.suse.com/1226595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-38545"
},
{
"cve": "CVE-2024-38559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a count-sized kernel buffer and copy count from\nuserspace to that buffer. Later, we use kstrtouint on this buffer but we\ndon\u0027t ensure that the string is terminated inside the buffer, this can\nlead to OOB read when using kstrtouint. Fix this issue by using\nmemdup_user_nul instead of memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38559",
"url": "https://www.suse.com/security/cve/CVE-2024-38559"
},
{
"category": "external",
"summary": "SUSE Bug 1226785 for CVE-2024-38559",
"url": "https://bugzilla.suse.com/1226785"
},
{
"category": "external",
"summary": "SUSE Bug 1227495 for CVE-2024-38559",
"url": "https://bugzilla.suse.com/1227495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-38559"
},
{
"cve": "CVE-2024-38560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38560"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bfa: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a nbytes-sized kernel buffer and copy nbytes from\nuserspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t\nensure that the string is terminated inside the buffer, this can lead to\nOOB read when using sscanf. Fix this issue by using memdup_user_nul instead\nof memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38560",
"url": "https://www.suse.com/security/cve/CVE-2024-38560"
},
{
"category": "external",
"summary": "SUSE Bug 1226786 for CVE-2024-38560",
"url": "https://bugzilla.suse.com/1226786"
},
{
"category": "external",
"summary": "SUSE Bug 1227319 for CVE-2024-38560",
"url": "https://bugzilla.suse.com/1227319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Enterprise Storage 7.1:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-150300_59_167-default-1-150300.7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Micro 5.2:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-64kb-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kernel-zfcpdump-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-base-5.3.18-150300.59.167.1.150300.18.98.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-default-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-devel-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-docs-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-macros-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-obs-build-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-preempt-devel-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-source-5.3.18-150300.59.167.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kernel-syms-5.3.18-150300.59.167.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:reiserfs-kmp-default-5.3.18-150300.59.167.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:02:32Z",
"details": "moderate"
}
],
"title": "CVE-2024-38560"
}
]
}
suse-su-2024:2365-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47247: net/mlx5e: Fix use-after-free of encap entry in neigh update handler (bsc#1224865).\n- CVE-2021-47311: net: qcom/emac: fix UAF in emac_remove (bsc#1225010).\n- CVE-2021-47368: enetc: Fix illegal access when reading affinity_hint (bsc#1225161).\n- CVE-2021-47372: net: macb: fix use after free on rmmod (bsc#1225184).\n- CVE-2021-47379: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd (bsc#1225203).\n- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).\n- CVE-2022-2938: psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1202623).\n- CVE-2022-48760: USB: core: Fix hang in usb_kill_urb by adding memory barriers (bsc#1226712).\n- CVE-2023-52707: sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1225109).\n- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).\n- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).\n- CVE-2024-26921: Preserve kabi for sk_buff (bsc#1223138).\n- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).\n- CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).\n- CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).\n- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).\n- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).\n- CVE-2024-35950: drm/client: Fully protect modes with dev-\u003emode_config.mutex (bsc#1224703).\n- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).\n- CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).\n- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).\n- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).\n- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595)\n- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226758).\n- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).\n\nThe following non-security bugs were fixed:\n\n- ocfs2: adjust enabling place for la window (bsc#1219224).\n- ocfs2: fix sparse warnings (bsc#1219224).\n- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).\n- ocfs2: speed up chain-list searching (bsc#1219224).\n- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).\n- x86/xen: Drop USERGS_SYSRET64 paravirt call (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2365,SUSE-SLE-Module-Live-Patching-15-SP2-2024-2365,SUSE-SLE-Product-HA-15-SP2-2024-2365,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-2365,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-2365,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-2365",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2365-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2365-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242365-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2365-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035864.html"
},
{
"category": "self",
"summary": "SUSE Bug 1171988",
"url": "https://bugzilla.suse.com/1171988"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1195065",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "self",
"summary": "SUSE Bug 1195254",
"url": "https://bugzilla.suse.com/1195254"
},
{
"category": "self",
"summary": "SUSE Bug 1202623",
"url": "https://bugzilla.suse.com/1202623"
},
{
"category": "self",
"summary": "SUSE Bug 1218148",
"url": "https://bugzilla.suse.com/1218148"
},
{
"category": "self",
"summary": "SUSE Bug 1219224",
"url": "https://bugzilla.suse.com/1219224"
},
{
"category": "self",
"summary": "SUSE Bug 1222015",
"url": "https://bugzilla.suse.com/1222015"
},
{
"category": "self",
"summary": "SUSE Bug 1223138",
"url": "https://bugzilla.suse.com/1223138"
},
{
"category": "self",
"summary": "SUSE Bug 1223384",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "self",
"summary": "SUSE Bug 1224671",
"url": "https://bugzilla.suse.com/1224671"
},
{
"category": "self",
"summary": "SUSE Bug 1224703",
"url": "https://bugzilla.suse.com/1224703"
},
{
"category": "self",
"summary": "SUSE Bug 1224749",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "self",
"summary": "SUSE Bug 1224764",
"url": "https://bugzilla.suse.com/1224764"
},
{
"category": "self",
"summary": "SUSE Bug 1224765",
"url": "https://bugzilla.suse.com/1224765"
},
{
"category": "self",
"summary": "SUSE Bug 1224766",
"url": "https://bugzilla.suse.com/1224766"
},
{
"category": "self",
"summary": "SUSE Bug 1224865",
"url": "https://bugzilla.suse.com/1224865"
},
{
"category": "self",
"summary": "SUSE Bug 1225010",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "self",
"summary": "SUSE Bug 1225047",
"url": "https://bugzilla.suse.com/1225047"
},
{
"category": "self",
"summary": "SUSE Bug 1225109",
"url": "https://bugzilla.suse.com/1225109"
},
{
"category": "self",
"summary": "SUSE Bug 1225161",
"url": "https://bugzilla.suse.com/1225161"
},
{
"category": "self",
"summary": "SUSE Bug 1225184",
"url": "https://bugzilla.suse.com/1225184"
},
{
"category": "self",
"summary": "SUSE Bug 1225203",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "self",
"summary": "SUSE Bug 1225487",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "self",
"summary": "SUSE Bug 1225518",
"url": "https://bugzilla.suse.com/1225518"
},
{
"category": "self",
"summary": "SUSE Bug 1225611",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "self",
"summary": "SUSE Bug 1225732",
"url": "https://bugzilla.suse.com/1225732"
},
{
"category": "self",
"summary": "SUSE Bug 1225749",
"url": "https://bugzilla.suse.com/1225749"
},
{
"category": "self",
"summary": "SUSE Bug 1225840",
"url": "https://bugzilla.suse.com/1225840"
},
{
"category": "self",
"summary": "SUSE Bug 1225866",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "self",
"summary": "SUSE Bug 1226563",
"url": "https://bugzilla.suse.com/1226563"
},
{
"category": "self",
"summary": "SUSE Bug 1226587",
"url": "https://bugzilla.suse.com/1226587"
},
{
"category": "self",
"summary": "SUSE Bug 1226595",
"url": "https://bugzilla.suse.com/1226595"
},
{
"category": "self",
"summary": "SUSE Bug 1226670",
"url": "https://bugzilla.suse.com/1226670"
},
{
"category": "self",
"summary": "SUSE Bug 1226672",
"url": "https://bugzilla.suse.com/1226672"
},
{
"category": "self",
"summary": "SUSE Bug 1226712",
"url": "https://bugzilla.suse.com/1226712"
},
{
"category": "self",
"summary": "SUSE Bug 1226732",
"url": "https://bugzilla.suse.com/1226732"
},
{
"category": "self",
"summary": "SUSE Bug 1226758",
"url": "https://bugzilla.suse.com/1226758"
},
{
"category": "self",
"summary": "SUSE Bug 1226786",
"url": "https://bugzilla.suse.com/1226786"
},
{
"category": "self",
"summary": "SUSE Bug 1226962",
"url": "https://bugzilla.suse.com/1226962"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3896 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4439 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47247 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47247/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47311 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47328 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47368 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47372 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47571 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47583 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0435 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22942 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48711 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48760 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48771 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-24023 page",
"url": "https://www.suse.com/security/cve/CVE-2023-24023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52707 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52752 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52881 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26921 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26921/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35789 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35861 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35862 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35864 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35878 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35878/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35950 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36894 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36894/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36904 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36940 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36964 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38541 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38559 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38560 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38560/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-07-09T14:03:50Z",
"generator": {
"date": "2024-07-09T14:03:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2365-1",
"initial_release_date": "2024-07-09T14:03:50Z",
"revision_history": [
{
"date": "2024-07-09T14:03:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-default-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"product_id": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-preempt-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.197.1.aarch64",
"product_id": "kernel-syms-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.197.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.197.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-150200.24.197.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-150200.24.197.1.noarch",
"product_id": "kernel-devel-5.3.18-150200.24.197.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-150200.24.197.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-150200.24.197.1.noarch",
"product_id": "kernel-docs-5.3.18-150200.24.197.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-150200.24.197.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-150200.24.197.1.noarch",
"product_id": "kernel-docs-html-5.3.18-150200.24.197.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-150200.24.197.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-150200.24.197.1.noarch",
"product_id": "kernel-macros-5.3.18-150200.24.197.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-150200.24.197.1.noarch",
"product": {
"name": "kernel-source-5.3.18-150200.24.197.1.noarch",
"product_id": "kernel-source-5.3.18-150200.24.197.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-150200.24.197.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-150200.24.197.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-150200.24.197.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-debug-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-default-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kernel-syms-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "kernel-default-5.3.18-150200.24.197.1.s390x",
"product_id": "kernel-default-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"product_id": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"product_id": "kernel-default-devel-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.197.1.s390x",
"product_id": "kernel-default-extra-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"product_id": "kernel-obs-build-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.197.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-150200.24.197.1.s390x",
"product_id": "kernel-syms-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-150200.24.197.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.197.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-debug-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-default-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"product_id": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-150200.24.197.1.150200.9.101.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-150200_24_197-preempt-1-150200.5.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-150200_24_197-preempt-1-150200.5.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-150200_24_197-preempt-1-150200.5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-preempt-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-150200.24.197.1.x86_64",
"product_id": "kernel-syms-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-150200.24.197.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-150200.24.197.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP2",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP2",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "kernel-default-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-150200.24.197.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch"
},
"product_reference": "kernel-source-5.3.18-150200.24.197.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10135"
}
],
"notes": [
{
"category": "general",
"text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10135",
"url": "https://www.suse.com/security/cve/CVE-2020-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1171988 for CVE-2020-10135",
"url": "https://bugzilla.suse.com/1171988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2020-10135"
},
{
"cve": "CVE-2021-3896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3896"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3896",
"url": "https://www.suse.com/security/cve/CVE-2021-3896"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-3896",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-3896"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2021-4439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: cpai: check ctr-\u003ecnr to avoid array index out of bound\n\nThe cmtp_add_connection() would add a cmtp session to a controller\nand run a kernel thread to process cmtp.\n\n\t__module_get(THIS_MODULE);\n\tsession-\u003etask = kthread_run(cmtp_session, session, \"kcmtpd_ctr_%d\",\n\t\t\t\t\t\t\t\tsession-\u003enum);\n\nDuring this process, the kernel thread would call detach_capi_ctr()\nto detach a register controller. if the controller\nwas not attached yet, detach_capi_ctr() would\ntrigger an array-index-out-bounds bug.\n\n[ 46.866069][ T6479] UBSAN: array-index-out-of-bounds in\ndrivers/isdn/capi/kcapi.c:483:21\n[ 46.867196][ T6479] index -1 is out of range for type \u0027capi_ctr *[32]\u0027\n[ 46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 Not tainted\n5.15.0-rc2+ #8\n[ 46.869002][ T6479] Hardware name: QEMU Standard PC (i440FX + PIIX,\n1996), BIOS 1.14.0-2 04/01/2014\n[ 46.870107][ T6479] Call Trace:\n[ 46.870473][ T6479] dump_stack_lvl+0x57/0x7d\n[ 46.870974][ T6479] ubsan_epilogue+0x5/0x40\n[ 46.871458][ T6479] __ubsan_handle_out_of_bounds.cold+0x43/0x48\n[ 46.872135][ T6479] detach_capi_ctr+0x64/0xc0\n[ 46.872639][ T6479] cmtp_session+0x5c8/0x5d0\n[ 46.873131][ T6479] ? __init_waitqueue_head+0x60/0x60\n[ 46.873712][ T6479] ? cmtp_add_msgpart+0x120/0x120\n[ 46.874256][ T6479] kthread+0x147/0x170\n[ 46.874709][ T6479] ? set_kthread_struct+0x40/0x40\n[ 46.875248][ T6479] ret_from_fork+0x1f/0x30\n[ 46.875773][ T6479]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4439",
"url": "https://www.suse.com/security/cve/CVE-2021-4439"
},
{
"category": "external",
"summary": "SUSE Bug 1226670 for CVE-2021-4439",
"url": "https://bugzilla.suse.com/1226670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-4439"
},
{
"cve": "CVE-2021-47247",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47247"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix use-after-free of encap entry in neigh update handler\n\nFunction mlx5e_rep_neigh_update() wasn\u0027t updated to accommodate rtnl lock\nremoval from TC filter update path and properly handle concurrent encap\nentry insertion/deletion which can lead to following use-after-free:\n\n [23827.464923] ==================================================================\n [23827.469446] BUG: KASAN: use-after-free in mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.470971] Read of size 4 at addr ffff8881d132228c by task kworker/u20:6/21635\n [23827.472251]\n [23827.472615] CPU: 9 PID: 21635 Comm: kworker/u20:6 Not tainted 5.13.0-rc3+ #5\n [23827.473788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n [23827.475639] Workqueue: mlx5e mlx5e_rep_neigh_update [mlx5_core]\n [23827.476731] Call Trace:\n [23827.477260] dump_stack+0xbb/0x107\n [23827.477906] print_address_description.constprop.0+0x18/0x140\n [23827.478896] ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.479879] ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.480905] kasan_report.cold+0x7c/0xd8\n [23827.481701] ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.482744] kasan_check_range+0x145/0x1a0\n [23827.493112] mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.494054] ? mlx5e_tc_tun_encap_info_equal_generic+0x140/0x140 [mlx5_core]\n [23827.495296] mlx5e_rep_neigh_update+0x41e/0x5e0 [mlx5_core]\n [23827.496338] ? mlx5e_rep_neigh_entry_release+0xb80/0xb80 [mlx5_core]\n [23827.497486] ? read_word_at_a_time+0xe/0x20\n [23827.498250] ? strscpy+0xa0/0x2a0\n [23827.498889] process_one_work+0x8ac/0x14e0\n [23827.499638] ? lockdep_hardirqs_on_prepare+0x400/0x400\n [23827.500537] ? pwq_dec_nr_in_flight+0x2c0/0x2c0\n [23827.501359] ? rwlock_bug.part.0+0x90/0x90\n [23827.502116] worker_thread+0x53b/0x1220\n [23827.502831] ? process_one_work+0x14e0/0x14e0\n [23827.503627] kthread+0x328/0x3f0\n [23827.504254] ? _raw_spin_unlock_irq+0x24/0x40\n [23827.505065] ? __kthread_bind_mask+0x90/0x90\n [23827.505912] ret_from_fork+0x1f/0x30\n [23827.506621]\n [23827.506987] Allocated by task 28248:\n [23827.507694] kasan_save_stack+0x1b/0x40\n [23827.508476] __kasan_kmalloc+0x7c/0x90\n [23827.509197] mlx5e_attach_encap+0xde1/0x1d40 [mlx5_core]\n [23827.510194] mlx5e_tc_add_fdb_flow+0x397/0xc40 [mlx5_core]\n [23827.511218] __mlx5e_add_fdb_flow+0x519/0xb30 [mlx5_core]\n [23827.512234] mlx5e_configure_flower+0x191c/0x4870 [mlx5_core]\n [23827.513298] tc_setup_cb_add+0x1d5/0x420\n [23827.514023] fl_hw_replace_filter+0x382/0x6a0 [cls_flower]\n [23827.514975] fl_change+0x2ceb/0x4a51 [cls_flower]\n [23827.515821] tc_new_tfilter+0x89a/0x2070\n [23827.516548] rtnetlink_rcv_msg+0x644/0x8c0\n [23827.517300] netlink_rcv_skb+0x11d/0x340\n [23827.518021] netlink_unicast+0x42b/0x700\n [23827.518742] netlink_sendmsg+0x743/0xc20\n [23827.519467] sock_sendmsg+0xb2/0xe0\n [23827.520131] ____sys_sendmsg+0x590/0x770\n [23827.520851] ___sys_sendmsg+0xd8/0x160\n [23827.521552] __sys_sendmsg+0xb7/0x140\n [23827.522238] do_syscall_64+0x3a/0x70\n [23827.522907] entry_SYSCALL_64_after_hwframe+0x44/0xae\n [23827.523797]\n [23827.524163] Freed by task 25948:\n [23827.524780] kasan_save_stack+0x1b/0x40\n [23827.525488] kasan_set_track+0x1c/0x30\n [23827.526187] kasan_set_free_info+0x20/0x30\n [23827.526968] __kasan_slab_free+0xed/0x130\n [23827.527709] slab_free_freelist_hook+0xcf/0x1d0\n [23827.528528] kmem_cache_free_bulk+0x33a/0x6e0\n [23827.529317] kfree_rcu_work+0x55f/0xb70\n [23827.530024] process_one_work+0x8ac/0x14e0\n [23827.530770] worker_thread+0x53b/0x1220\n [23827.531480] kthread+0x328/0x3f0\n [23827.532114] ret_from_fork+0x1f/0x30\n [23827.532785]\n [23827.533147] Last potentially related work creation:\n [23827.534007] kasan_save_stack+0x1b/0x40\n [23827.534710] kasan_record_aux_stack+0xab/0xc0\n [23827.535492] kvfree_call_rcu+0x31/0x7b0\n [23827.536206] mlx5e_tc_del\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47247",
"url": "https://www.suse.com/security/cve/CVE-2021-47247"
},
{
"category": "external",
"summary": "SUSE Bug 1224865 for CVE-2021-47247",
"url": "https://bugzilla.suse.com/1224865"
},
{
"category": "external",
"summary": "SUSE Bug 1227500 for CVE-2021-47247",
"url": "https://bugzilla.suse.com/1227500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2021-47247"
},
{
"cve": "CVE-2021-47311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47311"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qcom/emac: fix UAF in emac_remove\n\nadpt is netdev private data and it cannot be\nused after free_netdev() call. Using adpt after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47311",
"url": "https://www.suse.com/security/cve/CVE-2021-47311"
},
{
"category": "external",
"summary": "SUSE Bug 1225010 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "external",
"summary": "SUSE Bug 1227752 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1227752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47311"
},
{
"cve": "CVE-2021-47328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47328"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix conn use after free during resets\n\nIf we haven\u0027t done a unbind target call we can race where\niscsi_conn_teardown wakes up the EH thread and then frees the conn while\nthose threads are still accessing the conn ehwait.\n\nWe can only do one TMF per session so this just moves the TMF fields from\nthe conn to the session. We can then rely on the\niscsi_session_teardown-\u003eiscsi_remove_session-\u003e__iscsi_unbind_session call\nto remove the target and it\u0027s devices, and know after that point there is\nno device or scsi-ml callout trying to access the session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47328",
"url": "https://www.suse.com/security/cve/CVE-2021-47328"
},
{
"category": "external",
"summary": "SUSE Bug 1225047 for CVE-2021-47328",
"url": "https://bugzilla.suse.com/1225047"
},
{
"category": "external",
"summary": "SUSE Bug 1225080 for CVE-2021-47328",
"url": "https://bugzilla.suse.com/1225080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47328"
},
{
"cve": "CVE-2021-47368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47368"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nenetc: Fix illegal access when reading affinity_hint\n\nirq_set_affinity_hit() stores a reference to the cpumask_t\nparameter in the irq descriptor, and that reference can be\naccessed later from irq_affinity_hint_proc_show(). Since\nthe cpu_mask parameter passed to irq_set_affinity_hit() has\nonly temporary storage (it\u0027s on the stack memory), later\naccesses to it are illegal. Thus reads from the corresponding\nprocfs affinity_hint file can result in paging request oops.\n\nThe issue is fixed by the get_cpu_mask() helper, which provides\na permanent storage for the cpumask_t parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47368",
"url": "https://www.suse.com/security/cve/CVE-2021-47368"
},
{
"category": "external",
"summary": "SUSE Bug 1225161 for CVE-2021-47368",
"url": "https://bugzilla.suse.com/1225161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47368"
},
{
"cve": "CVE-2021-47372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47372"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix use after free on rmmod\n\nplat_dev-\u003edev-\u003eplatform_data is released by platform_device_unregister(),\nuse of pclk and hclk is a use-after-free. Since device unregister won\u0027t\nneed a clk device we adjust the function call sequence to fix this issue.\n\n[ 31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci]\n[ 31.275563] Freed by task 306:\n[ 30.276782] platform_device_release+0x25/0x80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47372",
"url": "https://www.suse.com/security/cve/CVE-2021-47372"
},
{
"category": "external",
"summary": "SUSE Bug 1225184 for CVE-2021-47372",
"url": "https://bugzilla.suse.com/1225184"
},
{
"category": "external",
"summary": "SUSE Bug 1229946 for CVE-2021-47372",
"url": "https://bugzilla.suse.com/1229946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2021-47372"
},
{
"cve": "CVE-2021-47379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd\n\nKASAN reports a use-after-free report when doing fuzz test:\n\n[693354.104835] ==================================================================\n[693354.105094] BUG: KASAN: use-after-free in bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105336] Read of size 4 at addr ffff888be0a35664 by task sh/1453338\n\n[693354.105607] CPU: 41 PID: 1453338 Comm: sh Kdump: loaded Not tainted 4.18.0-147\n[693354.105610] Hardware name: Huawei 2288H V5/BC11SPSCB0, BIOS 0.81 07/02/2018\n[693354.105612] Call Trace:\n[693354.105621] dump_stack+0xf1/0x19b\n[693354.105626] ? show_regs_print_info+0x5/0x5\n[693354.105634] ? printk+0x9c/0xc3\n[693354.105638] ? cpumask_weight+0x1f/0x1f\n[693354.105648] print_address_description+0x70/0x360\n[693354.105654] kasan_report+0x1b2/0x330\n[693354.105659] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105665] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105670] bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105675] ? bfq_cpd_init+0x20/0x20\n[693354.105683] cgroup_file_write+0x3aa/0x510\n[693354.105693] ? ___slab_alloc+0x507/0x540\n[693354.105698] ? cgroup_file_poll+0x60/0x60\n[693354.105702] ? 0xffffffff89600000\n[693354.105708] ? usercopy_abort+0x90/0x90\n[693354.105716] ? mutex_lock+0xef/0x180\n[693354.105726] kernfs_fop_write+0x1ab/0x280\n[693354.105732] ? cgroup_file_poll+0x60/0x60\n[693354.105738] vfs_write+0xe7/0x230\n[693354.105744] ksys_write+0xb0/0x140\n[693354.105749] ? __ia32_sys_read+0x50/0x50\n[693354.105760] do_syscall_64+0x112/0x370\n[693354.105766] ? syscall_return_slowpath+0x260/0x260\n[693354.105772] ? do_page_fault+0x9b/0x270\n[693354.105779] ? prepare_exit_to_usermode+0xf9/0x1a0\n[693354.105784] ? enter_from_user_mode+0x30/0x30\n[693354.105793] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.105875] Allocated by task 1453337:\n[693354.106001] kasan_kmalloc+0xa0/0xd0\n[693354.106006] kmem_cache_alloc_node_trace+0x108/0x220\n[693354.106010] bfq_pd_alloc+0x96/0x120\n[693354.106015] blkcg_activate_policy+0x1b7/0x2b0\n[693354.106020] bfq_create_group_hierarchy+0x1e/0x80\n[693354.106026] bfq_init_queue+0x678/0x8c0\n[693354.106031] blk_mq_init_sched+0x1f8/0x460\n[693354.106037] elevator_switch_mq+0xe1/0x240\n[693354.106041] elevator_switch+0x25/0x40\n[693354.106045] elv_iosched_store+0x1a1/0x230\n[693354.106049] queue_attr_store+0x78/0xb0\n[693354.106053] kernfs_fop_write+0x1ab/0x280\n[693354.106056] vfs_write+0xe7/0x230\n[693354.106060] ksys_write+0xb0/0x140\n[693354.106064] do_syscall_64+0x112/0x370\n[693354.106069] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106114] Freed by task 1453336:\n[693354.106225] __kasan_slab_free+0x130/0x180\n[693354.106229] kfree+0x90/0x1b0\n[693354.106233] blkcg_deactivate_policy+0x12c/0x220\n[693354.106238] bfq_exit_queue+0xf5/0x110\n[693354.106241] blk_mq_exit_sched+0x104/0x130\n[693354.106245] __elevator_exit+0x45/0x60\n[693354.106249] elevator_switch_mq+0xd6/0x240\n[693354.106253] elevator_switch+0x25/0x40\n[693354.106257] elv_iosched_store+0x1a1/0x230\n[693354.106261] queue_attr_store+0x78/0xb0\n[693354.106264] kernfs_fop_write+0x1ab/0x280\n[693354.106268] vfs_write+0xe7/0x230\n[693354.106271] ksys_write+0xb0/0x140\n[693354.106275] do_syscall_64+0x112/0x370\n[693354.106280] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106329] The buggy address belongs to the object at ffff888be0a35580\n which belongs to the cache kmalloc-1k of size 1024\n[693354.106736] The buggy address is located 228 bytes inside of\n 1024-byte region [ffff888be0a35580, ffff888be0a35980)\n[693354.107114] The buggy address belongs to the page:\n[693354.107273] page:ffffea002f828c00 count:1 mapcount:0 mapping:ffff888107c17080 index:0x0 compound_mapcount: 0\n[693354.107606] flags: 0x17ffffc0008100(slab|head)\n[693354.107760] raw: 0017ffffc0008100 ffffea002fcbc808 ffffea0030bd3a08 ffff888107c17080\n[693354.108020] r\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47379",
"url": "https://www.suse.com/security/cve/CVE-2021-47379"
},
{
"category": "external",
"summary": "SUSE Bug 1225203 for CVE-2021-47379",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "external",
"summary": "SUSE Bug 1225204 for CVE-2021-47379",
"url": "https://bugzilla.suse.com/1225204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47379"
},
{
"cve": "CVE-2021-47571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47571"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()\n\nThe free_rtllib() function frees the \"dev\" pointer so there is use\nafter free on the next line. Re-arrange things to avoid that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47571",
"url": "https://www.suse.com/security/cve/CVE-2021-47571"
},
{
"category": "external",
"summary": "SUSE Bug 1225518 for CVE-2021-47571",
"url": "https://bugzilla.suse.com/1225518"
},
{
"category": "external",
"summary": "SUSE Bug 1227551 for CVE-2021-47571",
"url": "https://bugzilla.suse.com/1227551"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2021-47571"
},
{
"cve": "CVE-2021-47583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47583"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mxl111sf: change mutex_init() location\n\nSyzbot reported, that mxl111sf_ctrl_msg() uses uninitialized\nmutex. The problem was in wrong mutex_init() location.\n\nPrevious mutex_init(\u0026state-\u003emsg_lock) call was in -\u003einit() function, but\ndvb_usbv2_init() has this order of calls:\n\n\tdvb_usbv2_init()\n\t dvb_usbv2_adapter_init()\n\t dvb_usbv2_adapter_frontend_init()\n\t props-\u003efrontend_attach()\n\n\t props-\u003einit()\n\nSince mxl111sf_* devices call mxl111sf_ctrl_msg() in -\u003efrontend_attach()\ninternally we need to initialize state-\u003emsg_lock before\nfrontend_attach(). To achieve it, -\u003eprobe() call added to all mxl111sf_*\ndevices, which will simply initiaize mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47583",
"url": "https://www.suse.com/security/cve/CVE-2021-47583"
},
{
"category": "external",
"summary": "SUSE Bug 1226563 for CVE-2021-47583",
"url": "https://bugzilla.suse.com/1226563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-47583"
},
{
"cve": "CVE-2022-0435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0435"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0435",
"url": "https://www.suse.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "SUSE Bug 1195254 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1195254"
},
{
"category": "external",
"summary": "SUSE Bug 1195308 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1195308"
},
{
"category": "external",
"summary": "SUSE Bug 1226672 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1226672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2022-0435"
},
{
"cve": "CVE-2022-22942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22942"
}
],
"notes": [
{
"category": "general",
"text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22942",
"url": "https://www.suse.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "SUSE Bug 1195065 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "external",
"summary": "SUSE Bug 1195951 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2938"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2938",
"url": "https://www.suse.com/security/cve/CVE-2022-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1202623 for CVE-2022-2938",
"url": "https://bugzilla.suse.com/1202623"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-2938"
},
{
"cve": "CVE-2022-48711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48711"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: improve size validations for received domain records\n\nThe function tipc_mon_rcv() allows a node to receive and process\ndomain_record structs from peer nodes to track their views of the\nnetwork topology.\n\nThis patch verifies that the number of members in a received domain\nrecord does not exceed the limit defined by MAX_MON_DOMAIN, something\nthat may otherwise lead to a stack overflow.\n\ntipc_mon_rcv() is called from the function tipc_link_proto_rcv(), where\nwe are reading a 32 bit message data length field into a uint16. To\navert any risk of bit overflow, we add an extra sanity check for this in\nthat function. We cannot see that happen with the current code, but\nfuture designers being unaware of this risk, may introduce it by\nallowing delivery of very large (\u003e 64k) sk buffers from the bearer\nlayer. This potential problem was identified by Eric Dumazet.\n\nThis fixes CVE-2022-0435",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48711",
"url": "https://www.suse.com/security/cve/CVE-2022-48711"
},
{
"category": "external",
"summary": "SUSE Bug 1226672 for CVE-2022-48711",
"url": "https://bugzilla.suse.com/1226672"
},
{
"category": "external",
"summary": "SUSE Bug 1227473 for CVE-2022-48711",
"url": "https://bugzilla.suse.com/1227473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48711"
},
{
"cve": "CVE-2022-48760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48760"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix hang in usb_kill_urb by adding memory barriers\n\nThe syzbot fuzzer has identified a bug in which processes hang waiting\nfor usb_kill_urb() to return. It turns out the issue is not unlinking\nthe URB; that works just fine. Rather, the problem arises when the\nwakeup notification that the URB has completed is not received.\n\nThe reason is memory-access ordering on SMP systems. In outline form,\nusb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on\ndifferent CPUs perform the following actions:\n\nCPU 0\t\t\t\t\tCPU 1\n----------------------------\t\t---------------------------------\nusb_kill_urb():\t\t\t\t__usb_hcd_giveback_urb():\n ...\t\t\t\t\t ...\n atomic_inc(\u0026urb-\u003ereject);\t\t atomic_dec(\u0026urb-\u003euse_count);\n ...\t\t\t\t\t ...\n wait_event(usb_kill_urb_queue,\n\tatomic_read(\u0026urb-\u003euse_count) == 0);\n\t\t\t\t\t if (atomic_read(\u0026urb-\u003ereject))\n\t\t\t\t\t\twake_up(\u0026usb_kill_urb_queue);\n\nConfining your attention to urb-\u003ereject and urb-\u003euse_count, you can\nsee that the overall pattern of accesses on CPU 0 is:\n\n\twrite urb-\u003ereject, then read urb-\u003euse_count;\n\nwhereas the overall pattern of accesses on CPU 1 is:\n\n\twrite urb-\u003euse_count, then read urb-\u003ereject.\n\nThis pattern is referred to in memory-model circles as SB (for \"Store\nBuffering\"), and it is well known that without suitable enforcement of\nthe desired order of accesses -- in the form of memory barriers -- it\nis entirely possible for one or both CPUs to execute their reads ahead\nof their writes. The end result will be that sometimes CPU 0 sees the\nold un-decremented value of urb-\u003euse_count while CPU 1 sees the old\nun-incremented value of urb-\u003ereject. Consequently CPU 0 ends up on\nthe wait queue and never gets woken up, leading to the observed hang\nin usb_kill_urb().\n\nThe same pattern of accesses occurs in usb_poison_urb() and the\nfailure pathway of usb_hcd_submit_urb().\n\nThe problem is fixed by adding suitable memory barriers. To provide\nproper memory-access ordering in the SB pattern, a full barrier is\nrequired on both CPUs. The atomic_inc() and atomic_dec() accesses\nthemselves don\u0027t provide any memory ordering, but since they are\npresent, we can use the optimized smp_mb__after_atomic() memory\nbarrier in the various routines to obtain the desired effect.\n\nThis patch adds the necessary memory barriers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48760",
"url": "https://www.suse.com/security/cve/CVE-2022-48760"
},
{
"category": "external",
"summary": "SUSE Bug 1226712 for CVE-2022-48760",
"url": "https://bugzilla.suse.com/1226712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48760"
},
{
"cve": "CVE-2022-48771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48771"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix stale file descriptors on failed usercopy\n\nA failing usercopy of the fence_rep object will lead to a stale entry in\nthe file descriptor table as put_unused_fd() won\u0027t release it. This\nenables userland to refer to a dangling \u0027file\u0027 object through that still\nvalid file descriptor, leading to all kinds of use-after-free\nexploitation scenarios.\n\nFix this by deferring the call to fd_install() until after the usercopy\nhas succeeded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48771",
"url": "https://www.suse.com/security/cve/CVE-2022-48771"
},
{
"category": "external",
"summary": "SUSE Bug 1226732 for CVE-2022-48771",
"url": "https://bugzilla.suse.com/1226732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2022-48771"
},
{
"cve": "CVE-2023-24023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-24023"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-24023",
"url": "https://www.suse.com/security/cve/CVE-2023-24023"
},
{
"category": "external",
"summary": "SUSE Bug 1218148 for CVE-2023-24023",
"url": "https://bugzilla.suse.com/1218148"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2023-52707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52707"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/psi: Fix use-after-free in ep_remove_wait_queue()\n\nIf a non-root cgroup gets removed when there is a thread that registered\ntrigger and is polling on a pressure file within the cgroup, the polling\nwaitqueue gets freed in the following path:\n\n do_rmdir\n cgroup_rmdir\n kernfs_drain_open_files\n cgroup_file_release\n cgroup_pressure_release\n psi_trigger_destroy\n\nHowever, the polling thread still has a reference to the pressure file and\nwill access the freed waitqueue when the file is closed or upon exit:\n\n fput\n ep_eventpoll_release\n ep_free\n ep_remove_wait_queue\n remove_wait_queue\n\nThis results in use-after-free as pasted below.\n\nThe fundamental problem here is that cgroup_file_release() (and\nconsequently waitqueue\u0027s lifetime) is not tied to the file\u0027s real lifetime.\nUsing wake_up_pollfree() here might be less than ideal, but it is in line\nwith the comment at commit 42288cb44c4b (\"wait: add wake_up_pollfree()\")\nsince the waitqueue\u0027s lifetime is not tied to file\u0027s one and can be\nconsidered as another special case. While this would be fixable by somehow\nmaking cgroup_file_release() be tied to the fput(), it would require\nsizable refactoring at cgroups or higher layer which might be more\njustifiable if we identify more cases like this.\n\n BUG: KASAN: use-after-free in _raw_spin_lock_irqsave+0x60/0xc0\n Write of size 4 at addr ffff88810e625328 by task a.out/4404\n\n\tCPU: 19 PID: 4404 Comm: a.out Not tainted 6.2.0-rc6 #38\n\tHardware name: Amazon EC2 c5a.8xlarge/, BIOS 1.0 10/16/2017\n\tCall Trace:\n\t\u003cTASK\u003e\n\tdump_stack_lvl+0x73/0xa0\n\tprint_report+0x16c/0x4e0\n\tkasan_report+0xc3/0xf0\n\tkasan_check_range+0x2d2/0x310\n\t_raw_spin_lock_irqsave+0x60/0xc0\n\tremove_wait_queue+0x1a/0xa0\n\tep_free+0x12c/0x170\n\tep_eventpoll_release+0x26/0x30\n\t__fput+0x202/0x400\n\ttask_work_run+0x11d/0x170\n\tdo_exit+0x495/0x1130\n\tdo_group_exit+0x100/0x100\n\tget_signal+0xd67/0xde0\n\tarch_do_signal_or_restart+0x2a/0x2b0\n\texit_to_user_mode_prepare+0x94/0x100\n\tsyscall_exit_to_user_mode+0x20/0x40\n\tdo_syscall_64+0x52/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\t\u003c/TASK\u003e\n\n Allocated by task 4404:\n\n\tkasan_set_track+0x3d/0x60\n\t__kasan_kmalloc+0x85/0x90\n\tpsi_trigger_create+0x113/0x3e0\n\tpressure_write+0x146/0x2e0\n\tcgroup_file_write+0x11c/0x250\n\tkernfs_fop_write_iter+0x186/0x220\n\tvfs_write+0x3d8/0x5c0\n\tksys_write+0x90/0x110\n\tdo_syscall_64+0x43/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\n Freed by task 4407:\n\n\tkasan_set_track+0x3d/0x60\n\tkasan_save_free_info+0x27/0x40\n\t____kasan_slab_free+0x11d/0x170\n\tslab_free_freelist_hook+0x87/0x150\n\t__kmem_cache_free+0xcb/0x180\n\tpsi_trigger_destroy+0x2e8/0x310\n\tcgroup_file_release+0x4f/0xb0\n\tkernfs_drain_open_files+0x165/0x1f0\n\tkernfs_drain+0x162/0x1a0\n\t__kernfs_remove+0x1fb/0x310\n\tkernfs_remove_by_name_ns+0x95/0xe0\n\tcgroup_addrm_files+0x67f/0x700\n\tcgroup_destroy_locked+0x283/0x3c0\n\tcgroup_rmdir+0x29/0x100\n\tkernfs_iop_rmdir+0xd1/0x140\n\tvfs_rmdir+0xfe/0x240\n\tdo_rmdir+0x13d/0x280\n\t__x64_sys_rmdir+0x2c/0x30\n\tdo_syscall_64+0x43/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52707",
"url": "https://www.suse.com/security/cve/CVE-2023-52707"
},
{
"category": "external",
"summary": "SUSE Bug 1225109 for CVE-2023-52707",
"url": "https://bugzilla.suse.com/1225109"
},
{
"category": "external",
"summary": "SUSE Bug 1225190 for CVE-2023-52707",
"url": "https://bugzilla.suse.com/1225190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2023-52707"
},
{
"cve": "CVE-2023-52752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free bug in cifs_debug_data_proc_show()\n\nSkip SMB sessions that are being teared down\n(e.g. @ses-\u003eses_status == SES_EXITING) in cifs_debug_data_proc_show()\nto avoid use-after-free in @ses.\n\nThis fixes the following GPF when reading from /proc/fs/cifs/DebugData\nwhile mounting and umounting\n\n [ 816.251274] general protection fault, probably for non-canonical\n address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI\n ...\n [ 816.260138] Call Trace:\n [ 816.260329] \u003cTASK\u003e\n [ 816.260499] ? die_addr+0x36/0x90\n [ 816.260762] ? exc_general_protection+0x1b3/0x410\n [ 816.261126] ? asm_exc_general_protection+0x26/0x30\n [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs]\n [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs]\n [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs]\n [ 816.262689] ? seq_read_iter+0x379/0x470\n [ 816.262995] seq_read_iter+0x118/0x470\n [ 816.263291] proc_reg_read_iter+0x53/0x90\n [ 816.263596] ? srso_alias_return_thunk+0x5/0x7f\n [ 816.263945] vfs_read+0x201/0x350\n [ 816.264211] ksys_read+0x75/0x100\n [ 816.264472] do_syscall_64+0x3f/0x90\n [ 816.264750] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n [ 816.265135] RIP: 0033:0x7fd5e669d381",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52752",
"url": "https://www.suse.com/security/cve/CVE-2023-52752"
},
{
"category": "external",
"summary": "SUSE Bug 1225487 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "external",
"summary": "SUSE Bug 1225819 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2023-52752"
},
{
"cve": "CVE-2023-52881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52881"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: do not accept ACK of bytes we never sent\n\nThis patch is based on a detailed report and ideas from Yepeng Pan\nand Christian Rossow.\n\nACK seq validation is currently following RFC 5961 5.2 guidelines:\n\n The ACK value is considered acceptable only if\n it is in the range of ((SND.UNA - MAX.SND.WND) \u003c= SEG.ACK \u003c=\n SND.NXT). All incoming segments whose ACK value doesn\u0027t satisfy the\n above condition MUST be discarded and an ACK sent back. It needs to\n be noted that RFC 793 on page 72 (fifth check) says: \"If the ACK is a\n duplicate (SEG.ACK \u003c SND.UNA), it can be ignored. If the ACK\n acknowledges something not yet sent (SEG.ACK \u003e SND.NXT) then send an\n ACK, drop the segment, and return\". The \"ignored\" above implies that\n the processing of the incoming data segment continues, which means\n the ACK value is treated as acceptable. This mitigation makes the\n ACK check more stringent since any ACK \u003c SND.UNA wouldn\u0027t be\n accepted, instead only ACKs that are in the range ((SND.UNA -\n MAX.SND.WND) \u003c= SEG.ACK \u003c= SND.NXT) get through.\n\nThis can be refined for new (and possibly spoofed) flows,\nby not accepting ACK for bytes that were never sent.\n\nThis greatly improves TCP security at a little cost.\n\nI added a Fixes: tag to make sure this patch will reach stable trees,\neven if the \u0027blamed\u0027 patch was adhering to the RFC.\n\ntp-\u003ebytes_acked was added in linux-4.2\n\nFollowing packetdrill test (courtesy of Yepeng Pan) shows\nthe issue at hand:\n\n0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3\n+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0\n+0 bind(3, ..., ...) = 0\n+0 listen(3, 1024) = 0\n\n// ---------------- Handshake ------------------- //\n\n// when window scale is set to 14 the window size can be extended to\n// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet\n// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)\n// ,though this ack number acknowledges some data never\n// sent by the server.\n\n+0 \u003c S 0:0(0) win 65535 \u003cmss 1400,nop,wscale 14\u003e\n+0 \u003e S. 0:0(0) ack 1 \u003c...\u003e\n+0 \u003c . 1:1(0) ack 1 win 65535\n+0 accept(3, ..., ...) = 4\n\n// For the established connection, we send an ACK packet,\n// the ack packet uses ack number 1 - 1073725300 + 2^32,\n// where 2^32 is used to wrap around.\n// Note: we used 1073725300 instead of 1073725440 to avoid possible\n// edge cases.\n// 1 - 1073725300 + 2^32 = 3221241997\n\n// Oops, old kernels happily accept this packet.\n+0 \u003c . 1:1001(1000) ack 3221241997 win 65535\n\n// After the kernel fix the following will be replaced by a challenge ACK,\n// and prior malicious frame would be dropped.\n+0 \u003e . 1:1(0) ack 1001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52881",
"url": "https://www.suse.com/security/cve/CVE-2023-52881"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1225611 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "external",
"summary": "SUSE Bug 1226152 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1226152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2023-52881"
},
{
"cve": "CVE-2024-26921",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26921"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: inet_defrag: prevent sk release while still in use\n\nip_local_out() and other functions can pass skb-\u003esk as function argument.\n\nIf the skb is a fragment and reassembly happens before such function call\nreturns, the sk must not be released.\n\nThis affects skb fragments reassembled via netfilter or similar\nmodules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.\n\nEric Dumazet made an initial analysis of this bug. Quoting Eric:\n Calling ip_defrag() in output path is also implying skb_orphan(),\n which is buggy because output path relies on sk not disappearing.\n\n A relevant old patch about the issue was :\n 8282f27449bf (\"inet: frag: Always orphan skbs inside ip_defrag()\")\n\n [..]\n\n net/ipv4/ip_output.c depends on skb-\u003esk being set, and probably to an\n inet socket, not an arbitrary one.\n\n If we orphan the packet in ipvlan, then downstream things like FQ\n packet scheduler will not work properly.\n\n We need to change ip_defrag() to only use skb_orphan() when really\n needed, ie whenever frag_list is going to be used.\n\nEric suggested to stash sk in fragment queue and made an initial patch.\nHowever there is a problem with this:\n\nIf skb is refragmented again right after, ip_do_fragment() will copy\nhead-\u003esk to the new fragments, and sets up destructor to sock_wfree.\nIOW, we have no choice but to fix up sk_wmem accouting to reflect the\nfully reassembled skb, else wmem will underflow.\n\nThis change moves the orphan down into the core, to last possible moment.\nAs ip_defrag_offset is aliased with sk_buff-\u003esk member, we must move the\noffset into the FRAG_CB, else skb-\u003esk gets clobbered.\n\nThis allows to delay the orphaning long enough to learn if the skb has\nto be queued or if the skb is completing the reasm queue.\n\nIn the former case, things work as before, skb is orphaned. This is\nsafe because skb gets queued/stolen and won\u0027t continue past reasm engine.\n\nIn the latter case, we will steal the skb-\u003esk reference, reattach it to\nthe head skb, and fix up wmem accouting when inet_frag inflates truesize.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26921",
"url": "https://www.suse.com/security/cve/CVE-2024-26921"
},
{
"category": "external",
"summary": "SUSE Bug 1223138 for CVE-2024-26921",
"url": "https://bugzilla.suse.com/1223138"
},
{
"category": "external",
"summary": "SUSE Bug 1223139 for CVE-2024-26921",
"url": "https://bugzilla.suse.com/1223139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix garbage collector racing against connect()\n\nGarbage collector does not take into account the risk of embryo getting\nenqueued during the garbage collection. If such embryo has a peer that\ncarries SCM_RIGHTS, two consecutive passes of scan_children() may see a\ndifferent set of children. Leading to an incorrectly elevated inflight\ncount, and then a dangling pointer within the gc_inflight_list.\n\nsockets are AF_UNIX/SOCK_STREAM\nS is an unconnected socket\nL is a listening in-flight socket bound to addr, not in fdtable\nV\u0027s fd will be passed via sendmsg(), gets inflight count bumped\n\nconnect(S, addr)\tsendmsg(S, [V]); close(V)\t__unix_gc()\n----------------\t-------------------------\t-----------\n\nNS = unix_create1()\nskb1 = sock_wmalloc(NS)\nL = unix_find_other(addr)\nunix_state_lock(L)\nunix_peer(S) = NS\n\t\t\t// V count=1 inflight=0\n\n \t\t\tNS = unix_peer(S)\n \t\t\tskb2 = sock_alloc()\n\t\t\tskb_queue_tail(NS, skb2[V])\n\n\t\t\t// V became in-flight\n\t\t\t// V count=2 inflight=1\n\n\t\t\tclose(V)\n\n\t\t\t// V count=1 inflight=1\n\t\t\t// GC candidate condition met\n\n\t\t\t\t\t\tfor u in gc_inflight_list:\n\t\t\t\t\t\t if (total_refs == inflight_refs)\n\t\t\t\t\t\t add u to gc_candidates\n\n\t\t\t\t\t\t// gc_candidates={L, V}\n\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t scan_children(u, dec_inflight)\n\n\t\t\t\t\t\t// embryo (skb1) was not\n\t\t\t\t\t\t// reachable from L yet, so V\u0027s\n\t\t\t\t\t\t// inflight remains unchanged\n__skb_queue_tail(L, skb1)\nunix_state_unlock(L)\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t if (u.inflight)\n\t\t\t\t\t\t scan_children(u, inc_inflight_move_tail)\n\n\t\t\t\t\t\t// V count=1 inflight=2 (!)\n\nIf there is a GC-candidate listening socket, lock/unlock its state. This\nmakes GC wait until the end of any ongoing connect() to that socket. After\nflipping the lock, a possibly SCM-laden embryo is already enqueued. And if\nthere is another embryo coming, it can not possibly carry SCM_RIGHTS. At\nthis point, unix_inflight() can not happen because unix_gc_lock is already\ntaken. Inflight graph remains unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26923",
"url": "https://www.suse.com/security/cve/CVE-2024-26923"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-26923",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1223683 for CVE-2024-26923",
"url": "https://bugzilla.suse.com/1223683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-26923"
},
{
"cve": "CVE-2024-35789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35789"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\n\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\nfast_rx entry still holds a pointer to the VLAN\u0027s netdev, which can cause\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\nafter the VLAN change.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35789",
"url": "https://www.suse.com/security/cve/CVE-2024-35789"
},
{
"category": "external",
"summary": "SUSE Bug 1224749 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "external",
"summary": "SUSE Bug 1227320 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1227320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35861"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35861",
"url": "https://www.suse.com/security/cve/CVE-2024-35861"
},
{
"category": "external",
"summary": "SUSE Bug 1224766 for CVE-2024-35861",
"url": "https://bugzilla.suse.com/1224766"
},
{
"category": "external",
"summary": "SUSE Bug 1225312 for CVE-2024-35861",
"url": "https://bugzilla.suse.com/1225312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2024-35861"
},
{
"cve": "CVE-2024-35862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35862"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_network_name_deleted()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35862",
"url": "https://www.suse.com/security/cve/CVE-2024-35862"
},
{
"category": "external",
"summary": "SUSE Bug 1224764 for CVE-2024-35862",
"url": "https://bugzilla.suse.com/1224764"
},
{
"category": "external",
"summary": "SUSE Bug 1225311 for CVE-2024-35862",
"url": "https://bugzilla.suse.com/1225311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2024-35862"
},
{
"cve": "CVE-2024-35864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35864"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_valid_lease_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35864",
"url": "https://www.suse.com/security/cve/CVE-2024-35864"
},
{
"category": "external",
"summary": "SUSE Bug 1224765 for CVE-2024-35864",
"url": "https://bugzilla.suse.com/1224765"
},
{
"category": "external",
"summary": "SUSE Bug 1225309 for CVE-2024-35864",
"url": "https://bugzilla.suse.com/1225309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2024-35864"
},
{
"cve": "CVE-2024-35878",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35878"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: prevent NULL pointer dereference in vsnprintf()\n\nIn of_modalias(), we can get passed the str and len parameters which would\ncause a kernel oops in vsnprintf() since it only allows passing a NULL ptr\nwhen the length is also 0. Also, we need to filter out the negative values\nof the len parameter as these will result in a really huge buffer since\nsnprintf() takes size_t parameter while ours is ssize_t...\n\nFound by Linux Verification Center (linuxtesting.org) with the Svace static\nanalysis tool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35878",
"url": "https://www.suse.com/security/cve/CVE-2024-35878"
},
{
"category": "external",
"summary": "SUSE Bug 1224671 for CVE-2024-35878",
"url": "https://bugzilla.suse.com/1224671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35878"
},
{
"cve": "CVE-2024-35950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35950"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fully protect modes[] with dev-\u003emode_config.mutex\n\nThe modes[] array contains pointers to modes on the connectors\u0027\nmode lists, which are protected by dev-\u003emode_config.mutex.\nThus we need to extend modes[] the same protection or by the\ntime we use it the elements may already be pointing to\nfreed/reused memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35950",
"url": "https://www.suse.com/security/cve/CVE-2024-35950"
},
{
"category": "external",
"summary": "SUSE Bug 1224703 for CVE-2024-35950",
"url": "https://bugzilla.suse.com/1224703"
},
{
"category": "external",
"summary": "SUSE Bug 1225310 for CVE-2024-35950",
"url": "https://bugzilla.suse.com/1225310"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-35950"
},
{
"cve": "CVE-2024-36894",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36894"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete\n\nFFS based applications can utilize the aio_cancel() callback to dequeue\npending USB requests submitted to the UDC. There is a scenario where the\nFFS application issues an AIO cancel call, while the UDC is handling a\nsoft disconnect. For a DWC3 based implementation, the callstack looks\nlike the following:\n\n DWC3 Gadget FFS Application\ndwc3_gadget_soft_disconnect() ...\n --\u003e dwc3_stop_active_transfers()\n --\u003e dwc3_gadget_giveback(-ESHUTDOWN)\n --\u003e ffs_epfile_async_io_complete() ffs_aio_cancel()\n --\u003e usb_ep_free_request() --\u003e usb_ep_dequeue()\n\nThere is currently no locking implemented between the AIO completion\nhandler and AIO cancel, so the issue occurs if the completion routine is\nrunning in parallel to an AIO cancel call coming from the FFS application.\nAs the completion call frees the USB request (io_data-\u003ereq) the FFS\napplication is also referencing it for the usb_ep_dequeue() call. This can\nlead to accessing a stale/hanging pointer.\n\ncommit b566d38857fc (\"usb: gadget: f_fs: use io_data-\u003estatus consistently\")\nrelocated the usb_ep_free_request() into ffs_epfile_async_io_complete().\nHowever, in order to properly implement locking to mitigate this issue, the\nspinlock can\u0027t be added to ffs_epfile_async_io_complete(), as\nusb_ep_dequeue() (if successfully dequeuing a USB request) will call the\nfunction driver\u0027s completion handler in the same context. Hence, leading\ninto a deadlock.\n\nFix this issue by moving the usb_ep_free_request() back to\nffs_user_copy_worker(), and ensuring that it explicitly sets io_data-\u003ereq\nto NULL after freeing it within the ffs-\u003eeps_lock. This resolves the race\ncondition above, as the ffs_aio_cancel() routine will not continue\nattempting to dequeue a request that has already been freed, or the\nffs_user_copy_work() not freeing the USB request until the AIO cancel is\ndone referencing it.\n\nThis fix depends on\n commit b566d38857fc (\"usb: gadget: f_fs: use io_data-\u003estatus\n consistently\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36894",
"url": "https://www.suse.com/security/cve/CVE-2024-36894"
},
{
"category": "external",
"summary": "SUSE Bug 1225749 for CVE-2024-36894",
"url": "https://bugzilla.suse.com/1225749"
},
{
"category": "external",
"summary": "SUSE Bug 1226139 for CVE-2024-36894",
"url": "https://bugzilla.suse.com/1226139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-36894"
},
{
"cve": "CVE-2024-36904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36904"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Use refcount_inc_not_zero() in tcp_twsk_unique().\n\nAnderson Nascimento reported a use-after-free splat in tcp_twsk_unique()\nwith nice analysis.\n\nSince commit ec94c2696f0b (\"tcp/dccp: avoid one atomic operation for\ntimewait hashdance\"), inet_twsk_hashdance() sets TIME-WAIT socket\u0027s\nsk_refcnt after putting it into ehash and releasing the bucket lock.\n\nThus, there is a small race window where other threads could try to\nreuse the port during connect() and call sock_hold() in tcp_twsk_unique()\nfor the TIME-WAIT socket with zero refcnt.\n\nIf that happens, the refcnt taken by tcp_twsk_unique() is overwritten\nand sock_put() will cause underflow, triggering a real use-after-free\nsomewhere else.\n\nTo avoid the use-after-free, we need to use refcount_inc_not_zero() in\ntcp_twsk_unique() and give up on reusing the port if it returns false.\n\n[0]:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110\nCPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1\nHardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023\nRIP: 0010:refcount_warn_saturate+0xe5/0x110\nCode: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff \u003c0f\u003e 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8\nRSP: 0018:ffffc90006b43b60 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027\nRDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0\nRBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0\nR10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84\nR13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0\nFS: 00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? refcount_warn_saturate+0xe5/0x110\n ? __warn+0x81/0x130\n ? refcount_warn_saturate+0xe5/0x110\n ? report_bug+0x171/0x1a0\n ? refcount_warn_saturate+0xe5/0x110\n ? handle_bug+0x3c/0x80\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? refcount_warn_saturate+0xe5/0x110\n tcp_twsk_unique+0x186/0x190\n __inet_check_established+0x176/0x2d0\n __inet_hash_connect+0x74/0x7d0\n ? __pfx___inet_check_established+0x10/0x10\n tcp_v4_connect+0x278/0x530\n __inet_stream_connect+0x10f/0x3d0\n inet_stream_connect+0x3a/0x60\n __sys_connect+0xa8/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0x83/0x170\n entry_SYSCALL_64_after_hwframe+0x78/0x80\nRIP: 0033:0x7f62c11a885d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48\nRSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d\nRDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003\nRBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0\nR13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36904",
"url": "https://www.suse.com/security/cve/CVE-2024-36904"
},
{
"category": "external",
"summary": "SUSE Bug 1225732 for CVE-2024-36904",
"url": "https://bugzilla.suse.com/1225732"
},
{
"category": "external",
"summary": "SUSE Bug 1225733 for CVE-2024-36904",
"url": "https://bugzilla.suse.com/1225733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-36904"
},
{
"cve": "CVE-2024-36940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36940"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: core: delete incorrect free in pinctrl_enable()\n\nThe \"pctldev\" struct is allocated in devm_pinctrl_register_and_init().\nIt\u0027s a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),\nso freeing it in pinctrl_enable() will lead to a double free.\n\nThe devm_pinctrl_dev_release() function frees the pindescs and destroys\nthe mutex as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36940",
"url": "https://www.suse.com/security/cve/CVE-2024-36940"
},
{
"category": "external",
"summary": "SUSE Bug 1225840 for CVE-2024-36940",
"url": "https://bugzilla.suse.com/1225840"
},
{
"category": "external",
"summary": "SUSE Bug 1225841 for CVE-2024-36940",
"url": "https://bugzilla.suse.com/1225841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000\u0027s perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36964",
"url": "https://www.suse.com/security/cve/CVE-2024-36964"
},
{
"category": "external",
"summary": "SUSE Bug 1225866 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "external",
"summary": "SUSE Bug 1226325 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1226325"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "important"
}
],
"title": "CVE-2024-36964"
},
{
"cve": "CVE-2024-38541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38541"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: add buffer overflow check in of_modalias()\n\nIn of_modalias(), if the buffer happens to be too small even for the 1st\nsnprintf() call, the len parameter will become negative and str parameter\n(if not NULL initially) will point beyond the buffer\u0027s end. Add the buffer\noverflow check after the 1st snprintf() call and fix such check after the\nstrlen() call (accounting for the terminating NUL char).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38541",
"url": "https://www.suse.com/security/cve/CVE-2024-38541"
},
{
"category": "external",
"summary": "SUSE Bug 1226587 for CVE-2024-38541",
"url": "https://bugzilla.suse.com/1226587"
},
{
"category": "external",
"summary": "SUSE Bug 1227496 for CVE-2024-38541",
"url": "https://bugzilla.suse.com/1227496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-38541"
},
{
"cve": "CVE-2024-38545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38545"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix UAF for cq async event\n\nThe refcount of CQ is not protected by locks. When CQ asynchronous\nevents and CQ destruction are concurrent, CQ may have been released,\nwhich will cause UAF.\n\nUse the xa_lock() to protect the CQ refcount.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38545",
"url": "https://www.suse.com/security/cve/CVE-2024-38545"
},
{
"category": "external",
"summary": "SUSE Bug 1226595 for CVE-2024-38545",
"url": "https://bugzilla.suse.com/1226595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-38545"
},
{
"cve": "CVE-2024-38559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a count-sized kernel buffer and copy count from\nuserspace to that buffer. Later, we use kstrtouint on this buffer but we\ndon\u0027t ensure that the string is terminated inside the buffer, this can\nlead to OOB read when using kstrtouint. Fix this issue by using\nmemdup_user_nul instead of memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38559",
"url": "https://www.suse.com/security/cve/CVE-2024-38559"
},
{
"category": "external",
"summary": "SUSE Bug 1226785 for CVE-2024-38559",
"url": "https://bugzilla.suse.com/1226785"
},
{
"category": "external",
"summary": "SUSE Bug 1227495 for CVE-2024-38559",
"url": "https://bugzilla.suse.com/1227495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-38559"
},
{
"cve": "CVE-2024-38560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38560"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bfa: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a nbytes-sized kernel buffer and copy nbytes from\nuserspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t\nensure that the string is terminated inside the buffer, this can lead to\nOOB read when using sscanf. Fix this issue by using memdup_user_nul instead\nof memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38560",
"url": "https://www.suse.com/security/cve/CVE-2024-38560"
},
{
"category": "external",
"summary": "SUSE Bug 1226786 for CVE-2024-38560",
"url": "https://bugzilla.suse.com/1226786"
},
{
"category": "external",
"summary": "SUSE Bug 1227319 for CVE-2024-38560",
"url": "https://bugzilla.suse.com/1227319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:cluster-md-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:dlm-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:gfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP2:ocfs2-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-default-livepatch-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP2:kernel-livepatch-5_3_18-150200_24_197-default-1-150200.5.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.aarch64",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.s390x",
"SUSE Linux Enterprise Server 15 SP2-LTSS:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-base-5.3.18-150200.24.197.1.150200.9.101.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-default-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-devel-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-docs-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-macros-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-obs-build-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-preempt-devel-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-source-5.3.18-150200.24.197.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:kernel-syms-5.3.18-150200.24.197.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP2:reiserfs-kmp-default-5.3.18-150200.24.197.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:03:50Z",
"details": "moderate"
}
],
"title": "CVE-2024-38560"
}
]
}
suse-su-2024:2895-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)\n- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).\n- CVE-2021-47219: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() (bsc#1222824).\n- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).\n- CVE-2021-47600: dm btree remove: fix use after free in rebalance_children() (bsc#1226575).\n- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).\n- CVE-2024-38599: jffs2: prevent xattr node from overflowing the eraseblock (bsc#1226848).\n- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).\n- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).\n- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).\n\nThe following non-security bugs were fixed:\n\n- af_unix: Do not use atomic ops for unix_sk(sk)-\u003einflight (bsc#1223384).\n- af_unix: Replace BUG_ON() with WARN_ON_ONCE() (bsc#1223384).\n- af_unix: annote lockless accesses to unix_tot_inflight \u0026 gc_in_progress (bsc#1223384).\n- kvm: prevent kvm_clock time-warps (bsc#1197439).\n- net: unix: properly re-increment inflight counter of GC discarded candidates (bsc#1223384).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2895,SUSE-SLE-SERVER-11-SP4-LTSS-EXTREME-CORE-2024-2895",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2895-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2895-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242895-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2895-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1197439",
"url": "https://bugzilla.suse.com/1197439"
},
{
"category": "self",
"summary": "SUSE Bug 1222824",
"url": "https://bugzilla.suse.com/1222824"
},
{
"category": "self",
"summary": "SUSE Bug 1223384",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "self",
"summary": "SUSE Bug 1225431",
"url": "https://bugzilla.suse.com/1225431"
},
{
"category": "self",
"summary": "SUSE Bug 1225487",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "self",
"summary": "SUSE Bug 1225611",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "self",
"summary": "SUSE Bug 1225866",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "self",
"summary": "SUSE Bug 1226550",
"url": "https://bugzilla.suse.com/1226550"
},
{
"category": "self",
"summary": "SUSE Bug 1226575",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "self",
"summary": "SUSE Bug 1226670",
"url": "https://bugzilla.suse.com/1226670"
},
{
"category": "self",
"summary": "SUSE Bug 1226848",
"url": "https://bugzilla.suse.com/1226848"
},
{
"category": "self",
"summary": "SUSE Bug 1227154",
"url": "https://bugzilla.suse.com/1227154"
},
{
"category": "self",
"summary": "SUSE Bug 1228743",
"url": "https://bugzilla.suse.com/1228743"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-20022 page",
"url": "https://www.suse.com/security/cve/CVE-2016-20022/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4439 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47219 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47219/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47520 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47520/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47580 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47600 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52752 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52881 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36964 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38599 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-42145 page",
"url": "https://www.suse.com/security/cve/CVE-2024-42145/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-08-13T14:08:42Z",
"generator": {
"date": "2024-08-13T14:08:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2895-1",
"initial_release_date": "2024-08-13T14:08:42Z",
"revision_history": [
{
"date": "2024-08-13T14:08:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-debug-3.0.101-108.159.1.i586",
"product_id": "kernel-debug-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-debug-base-3.0.101-108.159.1.i586",
"product_id": "kernel-debug-base-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-debug-devel-3.0.101-108.159.1.i586",
"product_id": "kernel-debug-devel-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-debug-extra-3.0.101-108.159.1.i586",
"product_id": "kernel-debug-extra-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-debug-hmac-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-debug-hmac-3.0.101-108.159.1.i586",
"product_id": "kernel-debug-hmac-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.159.1.i586",
"product_id": "kernel-default-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.159.1.i586",
"product_id": "kernel-default-base-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.159.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-default-extra-3.0.101-108.159.1.i586",
"product_id": "kernel-default-extra-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-hmac-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-default-hmac-3.0.101-108.159.1.i586",
"product_id": "kernel-default-hmac-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.159.1.i586",
"product_id": "kernel-ec2-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.159.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.159.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-ec2-extra-3.0.101-108.159.1.i586",
"product_id": "kernel-ec2-extra-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-hmac-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-ec2-hmac-3.0.101-108.159.1.i586",
"product_id": "kernel-ec2-hmac-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.159.1.i586",
"product_id": "kernel-pae-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.159.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.159.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-extra-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-pae-extra-3.0.101-108.159.1.i586",
"product_id": "kernel-pae-extra-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-hmac-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-pae-hmac-3.0.101-108.159.1.i586",
"product_id": "kernel-pae-hmac-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.159.1.i586",
"product_id": "kernel-source-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.159.1.i586",
"product_id": "kernel-source-vanilla-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.159.1.i586",
"product_id": "kernel-syms-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.159.1.i586",
"product_id": "kernel-trace-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.159.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.159.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-extra-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-trace-extra-3.0.101-108.159.1.i586",
"product_id": "kernel-trace-extra-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-hmac-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-trace-hmac-3.0.101-108.159.1.i586",
"product_id": "kernel-trace-hmac-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-vanilla-3.0.101-108.159.1.i586",
"product_id": "kernel-vanilla-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-vanilla-base-3.0.101-108.159.1.i586",
"product_id": "kernel-vanilla-base-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-vanilla-devel-3.0.101-108.159.1.i586",
"product_id": "kernel-vanilla-devel-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-hmac-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-vanilla-hmac-3.0.101-108.159.1.i586",
"product_id": "kernel-vanilla-hmac-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.159.1.i586",
"product_id": "kernel-xen-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.159.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.159.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-extra-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-xen-extra-3.0.101-108.159.1.i586",
"product_id": "kernel-xen-extra-3.0.101-108.159.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-hmac-3.0.101-108.159.1.i586",
"product": {
"name": "kernel-xen-hmac-3.0.101-108.159.1.i586",
"product_id": "kernel-xen-hmac-3.0.101-108.159.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.159.1.ia64",
"product": {
"name": "kernel-source-3.0.101-108.159.1.ia64",
"product_id": "kernel-source-3.0.101-108.159.1.ia64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.159.1.ia64",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.159.1.ia64",
"product_id": "kernel-source-vanilla-3.0.101-108.159.1.ia64"
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-docs-3.0.101-108.159.1.noarch",
"product": {
"name": "kernel-docs-3.0.101-108.159.1.noarch",
"product_id": "kernel-docs-3.0.101-108.159.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.159.1.ppc",
"product": {
"name": "kernel-source-3.0.101-108.159.1.ppc",
"product_id": "kernel-source-3.0.101-108.159.1.ppc"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.159.1.ppc",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.159.1.ppc",
"product_id": "kernel-source-vanilla-3.0.101-108.159.1.ppc"
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.159.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.159.1.ppc64",
"product_id": "kernel-source-3.0.101-108.159.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.159.1.ppc64",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.159.1.ppc64",
"product_id": "kernel-source-vanilla-3.0.101-108.159.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.159.1.s390",
"product": {
"name": "kernel-source-3.0.101-108.159.1.s390",
"product_id": "kernel-source-3.0.101-108.159.1.s390"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.159.1.s390",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.159.1.s390",
"product_id": "kernel-source-vanilla-3.0.101-108.159.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.159.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.159.1.s390x",
"product_id": "kernel-source-3.0.101-108.159.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.159.1.s390x",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.159.1.s390x",
"product_id": "kernel-source-vanilla-3.0.101-108.159.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-debug-3.0.101-108.159.1.x86_64",
"product_id": "kernel-debug-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-debug-base-3.0.101-108.159.1.x86_64",
"product_id": "kernel-debug-base-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-debug-devel-3.0.101-108.159.1.x86_64",
"product_id": "kernel-debug-devel-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-debug-extra-3.0.101-108.159.1.x86_64",
"product_id": "kernel-debug-extra-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-hmac-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-debug-hmac-3.0.101-108.159.1.x86_64",
"product_id": "kernel-debug-hmac-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.159.1.x86_64",
"product_id": "kernel-default-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.159.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.159.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-default-extra-3.0.101-108.159.1.x86_64",
"product_id": "kernel-default-extra-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-hmac-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-default-hmac-3.0.101-108.159.1.x86_64",
"product_id": "kernel-default-hmac-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.159.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.159.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-extra-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-ec2-extra-3.0.101-108.159.1.x86_64",
"product_id": "kernel-ec2-extra-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-hmac-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-ec2-hmac-3.0.101-108.159.1.x86_64",
"product_id": "kernel-ec2-hmac-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.159.1.x86_64",
"product_id": "kernel-source-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-source-vanilla-3.0.101-108.159.1.x86_64",
"product_id": "kernel-source-vanilla-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.159.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.159.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.159.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.159.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-extra-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-trace-extra-3.0.101-108.159.1.x86_64",
"product_id": "kernel-trace-extra-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-hmac-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-trace-hmac-3.0.101-108.159.1.x86_64",
"product_id": "kernel-trace-hmac-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-vanilla-3.0.101-108.159.1.x86_64",
"product_id": "kernel-vanilla-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-vanilla-base-3.0.101-108.159.1.x86_64",
"product_id": "kernel-vanilla-base-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-3.0.101-108.159.1.x86_64",
"product_id": "kernel-vanilla-devel-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-hmac-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-vanilla-hmac-3.0.101-108.159.1.x86_64",
"product_id": "kernel-vanilla-hmac-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.159.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.159.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.159.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-extra-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-xen-extra-3.0.101-108.159.1.x86_64",
"product_id": "kernel-xen-extra-3.0.101-108.159.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-hmac-3.0.101-108.159.1.x86_64",
"product": {
"name": "kernel-xen-hmac-3.0.101-108.159.1.x86_64",
"product_id": "kernel-xen-hmac-3.0.101-108.159.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles_ltss-extreme-core:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.159.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE",
"product_id": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.159.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-20022",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-20022"
}
],
"notes": [
{
"category": "general",
"text": "** UNSUPPORTED WHEN ASSIGNED ** In the Linux kernel before 4.8, usb_parse_endpoint in drivers/usb/core/config.c does not validate the wMaxPacketSize field of an endpoint descriptor. NOTE: This vulnerability only affects products that are no longer supported by the supplier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-20022",
"url": "https://www.suse.com/security/cve/CVE-2016-20022"
},
{
"category": "external",
"summary": "SUSE Bug 1227154 for CVE-2016-20022",
"url": "https://bugzilla.suse.com/1227154"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2016-20022"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2021-4439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: cpai: check ctr-\u003ecnr to avoid array index out of bound\n\nThe cmtp_add_connection() would add a cmtp session to a controller\nand run a kernel thread to process cmtp.\n\n\t__module_get(THIS_MODULE);\n\tsession-\u003etask = kthread_run(cmtp_session, session, \"kcmtpd_ctr_%d\",\n\t\t\t\t\t\t\t\tsession-\u003enum);\n\nDuring this process, the kernel thread would call detach_capi_ctr()\nto detach a register controller. if the controller\nwas not attached yet, detach_capi_ctr() would\ntrigger an array-index-out-bounds bug.\n\n[ 46.866069][ T6479] UBSAN: array-index-out-of-bounds in\ndrivers/isdn/capi/kcapi.c:483:21\n[ 46.867196][ T6479] index -1 is out of range for type \u0027capi_ctr *[32]\u0027\n[ 46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 Not tainted\n5.15.0-rc2+ #8\n[ 46.869002][ T6479] Hardware name: QEMU Standard PC (i440FX + PIIX,\n1996), BIOS 1.14.0-2 04/01/2014\n[ 46.870107][ T6479] Call Trace:\n[ 46.870473][ T6479] dump_stack_lvl+0x57/0x7d\n[ 46.870974][ T6479] ubsan_epilogue+0x5/0x40\n[ 46.871458][ T6479] __ubsan_handle_out_of_bounds.cold+0x43/0x48\n[ 46.872135][ T6479] detach_capi_ctr+0x64/0xc0\n[ 46.872639][ T6479] cmtp_session+0x5c8/0x5d0\n[ 46.873131][ T6479] ? __init_waitqueue_head+0x60/0x60\n[ 46.873712][ T6479] ? cmtp_add_msgpart+0x120/0x120\n[ 46.874256][ T6479] kthread+0x147/0x170\n[ 46.874709][ T6479] ? set_kthread_struct+0x40/0x40\n[ 46.875248][ T6479] ret_from_fork+0x1f/0x30\n[ 46.875773][ T6479]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4439",
"url": "https://www.suse.com/security/cve/CVE-2021-4439"
},
{
"category": "external",
"summary": "SUSE Bug 1226670 for CVE-2021-4439",
"url": "https://bugzilla.suse.com/1226670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-4439"
},
{
"cve": "CVE-2021-47219",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47219"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()\n\nThe following issue was observed running syzkaller:\n\nBUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline]\nBUG: KASAN: slab-out-of-bounds in sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\nRead of size 2132 at addr ffff8880aea95dc8 by task syz-executor.0/9815\n\nCPU: 0 PID: 9815 Comm: syz-executor.0 Not tainted 4.19.202-00874-gfc0fe04215a9 #2\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0xe4/0x14a lib/dump_stack.c:118\n print_address_description+0x73/0x280 mm/kasan/report.c:253\n kasan_report_error mm/kasan/report.c:352 [inline]\n kasan_report+0x272/0x370 mm/kasan/report.c:410\n memcpy+0x1f/0x50 mm/kasan/kasan.c:302\n memcpy include/linux/string.h:377 [inline]\n sg_copy_buffer+0x150/0x1c0 lib/scatterlist.c:831\n fill_from_dev_buffer+0x14f/0x340 drivers/scsi/scsi_debug.c:1021\n resp_report_tgtpgs+0x5aa/0x770 drivers/scsi/scsi_debug.c:1772\n schedule_resp+0x464/0x12f0 drivers/scsi/scsi_debug.c:4429\n scsi_debug_queuecommand+0x467/0x1390 drivers/scsi/scsi_debug.c:5835\n scsi_dispatch_cmd+0x3fc/0x9b0 drivers/scsi/scsi_lib.c:1896\n scsi_request_fn+0x1042/0x1810 drivers/scsi/scsi_lib.c:2034\n __blk_run_queue_uncond block/blk-core.c:464 [inline]\n __blk_run_queue+0x1a4/0x380 block/blk-core.c:484\n blk_execute_rq_nowait+0x1c2/0x2d0 block/blk-exec.c:78\n sg_common_write.isra.19+0xd74/0x1dc0 drivers/scsi/sg.c:847\n sg_write.part.23+0x6e0/0xd00 drivers/scsi/sg.c:716\n sg_write+0x64/0xa0 drivers/scsi/sg.c:622\n __vfs_write+0xed/0x690 fs/read_write.c:485\nkill_bdev:block_device:00000000e138492c\n vfs_write+0x184/0x4c0 fs/read_write.c:549\n ksys_write+0x107/0x240 fs/read_write.c:599\n do_syscall_64+0xc2/0x560 arch/x86/entry/common.c:293\n entry_SYSCALL_64_after_hwframe+0x49/0xbe\n\nWe get \u0027alen\u0027 from command its type is int. If userspace passes a large\nlength we will get a negative \u0027alen\u0027.\n\nSwitch n, alen, and rlen to u32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47219",
"url": "https://www.suse.com/security/cve/CVE-2021-47219"
},
{
"category": "external",
"summary": "SUSE Bug 1222824 for CVE-2021-47219",
"url": "https://bugzilla.suse.com/1222824"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-47219"
},
{
"cve": "CVE-2021-47520",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47520"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: pch_can: pch_can_rx_normal: fix use after free\n\nAfter calling netif_receive_skb(skb), dereferencing skb is unsafe.\nEspecially, the can_frame cf which aliases skb memory is dereferenced\njust after the call netif_receive_skb(skb).\n\nReordering the lines solves the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47520",
"url": "https://www.suse.com/security/cve/CVE-2021-47520"
},
{
"category": "external",
"summary": "SUSE Bug 1225431 for CVE-2021-47520",
"url": "https://bugzilla.suse.com/1225431"
},
{
"category": "external",
"summary": "SUSE Bug 1227905 for CVE-2021-47520",
"url": "https://bugzilla.suse.com/1227905"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "important"
}
],
"title": "CVE-2021-47520"
},
{
"cve": "CVE-2021-47580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47580"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix type in min_t to avoid stack OOB\n\nChange min_t() to use type \"u32\" instead of type \"int\" to avoid stack out\nof bounds. With min_t() type \"int\" the values get sign extended and the\nlarger value gets used causing stack out of bounds.\n\nBUG: KASAN: stack-out-of-bounds in memcpy include/linux/fortify-string.h:191 [inline]\nBUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\nRead of size 127 at addr ffff888072607128 by task syz-executor.7/18707\n\nCPU: 1 PID: 18707 Comm: syz-executor.7 Not tainted 5.15.0-syzk #1\nHardware name: Red Hat KVM, BIOS 1.13.0-2\nCall Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:106\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:256\n __kasan_report mm/kasan/report.c:442 [inline]\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:459\n check_region_inline mm/kasan/generic.c:183 [inline]\n kasan_check_range+0x1a3/0x210 mm/kasan/generic.c:189\n memcpy+0x23/0x60 mm/kasan/shadow.c:65\n memcpy include/linux/fortify-string.h:191 [inline]\n sg_copy_buffer+0x1de/0x240 lib/scatterlist.c:976\n sg_copy_from_buffer+0x33/0x40 lib/scatterlist.c:1000\n fill_from_dev_buffer.part.34+0x82/0x130 drivers/scsi/scsi_debug.c:1162\n fill_from_dev_buffer drivers/scsi/scsi_debug.c:1888 [inline]\n resp_readcap16+0x365/0x3b0 drivers/scsi/scsi_debug.c:1887\n schedule_resp+0x4d8/0x1a70 drivers/scsi/scsi_debug.c:5478\n scsi_debug_queuecommand+0x8c9/0x1ec0 drivers/scsi/scsi_debug.c:7533\n scsi_dispatch_cmd drivers/scsi/scsi_lib.c:1520 [inline]\n scsi_queue_rq+0x16b0/0x2d40 drivers/scsi/scsi_lib.c:1699\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1639\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1761\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1838\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:62\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:836\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:774\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:939\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1165\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:874 [inline]\n __se_sys_ioctl fs/ioctl.c:860 [inline]\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:860\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47580",
"url": "https://www.suse.com/security/cve/CVE-2021-47580"
},
{
"category": "external",
"summary": "SUSE Bug 1226550 for CVE-2021-47580",
"url": "https://bugzilla.suse.com/1226550"
},
{
"category": "external",
"summary": "SUSE Bug 1227611 for CVE-2021-47580",
"url": "https://bugzilla.suse.com/1227611"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-47580"
},
{
"cve": "CVE-2021-47600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47600"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: fix use after free in rebalance_children()\n\nMove dm_tm_unlock() after dm_tm_dec().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47600",
"url": "https://www.suse.com/security/cve/CVE-2021-47600"
},
{
"category": "external",
"summary": "SUSE Bug 1226575 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "external",
"summary": "SUSE Bug 1227472 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1227472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-47600"
},
{
"cve": "CVE-2023-52752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free bug in cifs_debug_data_proc_show()\n\nSkip SMB sessions that are being teared down\n(e.g. @ses-\u003eses_status == SES_EXITING) in cifs_debug_data_proc_show()\nto avoid use-after-free in @ses.\n\nThis fixes the following GPF when reading from /proc/fs/cifs/DebugData\nwhile mounting and umounting\n\n [ 816.251274] general protection fault, probably for non-canonical\n address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI\n ...\n [ 816.260138] Call Trace:\n [ 816.260329] \u003cTASK\u003e\n [ 816.260499] ? die_addr+0x36/0x90\n [ 816.260762] ? exc_general_protection+0x1b3/0x410\n [ 816.261126] ? asm_exc_general_protection+0x26/0x30\n [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs]\n [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs]\n [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs]\n [ 816.262689] ? seq_read_iter+0x379/0x470\n [ 816.262995] seq_read_iter+0x118/0x470\n [ 816.263291] proc_reg_read_iter+0x53/0x90\n [ 816.263596] ? srso_alias_return_thunk+0x5/0x7f\n [ 816.263945] vfs_read+0x201/0x350\n [ 816.264211] ksys_read+0x75/0x100\n [ 816.264472] do_syscall_64+0x3f/0x90\n [ 816.264750] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n [ 816.265135] RIP: 0033:0x7fd5e669d381",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52752",
"url": "https://www.suse.com/security/cve/CVE-2023-52752"
},
{
"category": "external",
"summary": "SUSE Bug 1225487 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "external",
"summary": "SUSE Bug 1225819 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "important"
}
],
"title": "CVE-2023-52752"
},
{
"cve": "CVE-2023-52881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52881"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: do not accept ACK of bytes we never sent\n\nThis patch is based on a detailed report and ideas from Yepeng Pan\nand Christian Rossow.\n\nACK seq validation is currently following RFC 5961 5.2 guidelines:\n\n The ACK value is considered acceptable only if\n it is in the range of ((SND.UNA - MAX.SND.WND) \u003c= SEG.ACK \u003c=\n SND.NXT). All incoming segments whose ACK value doesn\u0027t satisfy the\n above condition MUST be discarded and an ACK sent back. It needs to\n be noted that RFC 793 on page 72 (fifth check) says: \"If the ACK is a\n duplicate (SEG.ACK \u003c SND.UNA), it can be ignored. If the ACK\n acknowledges something not yet sent (SEG.ACK \u003e SND.NXT) then send an\n ACK, drop the segment, and return\". The \"ignored\" above implies that\n the processing of the incoming data segment continues, which means\n the ACK value is treated as acceptable. This mitigation makes the\n ACK check more stringent since any ACK \u003c SND.UNA wouldn\u0027t be\n accepted, instead only ACKs that are in the range ((SND.UNA -\n MAX.SND.WND) \u003c= SEG.ACK \u003c= SND.NXT) get through.\n\nThis can be refined for new (and possibly spoofed) flows,\nby not accepting ACK for bytes that were never sent.\n\nThis greatly improves TCP security at a little cost.\n\nI added a Fixes: tag to make sure this patch will reach stable trees,\neven if the \u0027blamed\u0027 patch was adhering to the RFC.\n\ntp-\u003ebytes_acked was added in linux-4.2\n\nFollowing packetdrill test (courtesy of Yepeng Pan) shows\nthe issue at hand:\n\n0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3\n+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0\n+0 bind(3, ..., ...) = 0\n+0 listen(3, 1024) = 0\n\n// ---------------- Handshake ------------------- //\n\n// when window scale is set to 14 the window size can be extended to\n// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet\n// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)\n// ,though this ack number acknowledges some data never\n// sent by the server.\n\n+0 \u003c S 0:0(0) win 65535 \u003cmss 1400,nop,wscale 14\u003e\n+0 \u003e S. 0:0(0) ack 1 \u003c...\u003e\n+0 \u003c . 1:1(0) ack 1 win 65535\n+0 accept(3, ..., ...) = 4\n\n// For the established connection, we send an ACK packet,\n// the ack packet uses ack number 1 - 1073725300 + 2^32,\n// where 2^32 is used to wrap around.\n// Note: we used 1073725300 instead of 1073725440 to avoid possible\n// edge cases.\n// 1 - 1073725300 + 2^32 = 3221241997\n\n// Oops, old kernels happily accept this packet.\n+0 \u003c . 1:1001(1000) ack 3221241997 win 65535\n\n// After the kernel fix the following will be replaced by a challenge ACK,\n// and prior malicious frame would be dropped.\n+0 \u003e . 1:1(0) ack 1001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52881",
"url": "https://www.suse.com/security/cve/CVE-2023-52881"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1225611 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "external",
"summary": "SUSE Bug 1226152 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1226152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2023-52881"
},
{
"cve": "CVE-2024-26923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix garbage collector racing against connect()\n\nGarbage collector does not take into account the risk of embryo getting\nenqueued during the garbage collection. If such embryo has a peer that\ncarries SCM_RIGHTS, two consecutive passes of scan_children() may see a\ndifferent set of children. Leading to an incorrectly elevated inflight\ncount, and then a dangling pointer within the gc_inflight_list.\n\nsockets are AF_UNIX/SOCK_STREAM\nS is an unconnected socket\nL is a listening in-flight socket bound to addr, not in fdtable\nV\u0027s fd will be passed via sendmsg(), gets inflight count bumped\n\nconnect(S, addr)\tsendmsg(S, [V]); close(V)\t__unix_gc()\n----------------\t-------------------------\t-----------\n\nNS = unix_create1()\nskb1 = sock_wmalloc(NS)\nL = unix_find_other(addr)\nunix_state_lock(L)\nunix_peer(S) = NS\n\t\t\t// V count=1 inflight=0\n\n \t\t\tNS = unix_peer(S)\n \t\t\tskb2 = sock_alloc()\n\t\t\tskb_queue_tail(NS, skb2[V])\n\n\t\t\t// V became in-flight\n\t\t\t// V count=2 inflight=1\n\n\t\t\tclose(V)\n\n\t\t\t// V count=1 inflight=1\n\t\t\t// GC candidate condition met\n\n\t\t\t\t\t\tfor u in gc_inflight_list:\n\t\t\t\t\t\t if (total_refs == inflight_refs)\n\t\t\t\t\t\t add u to gc_candidates\n\n\t\t\t\t\t\t// gc_candidates={L, V}\n\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t scan_children(u, dec_inflight)\n\n\t\t\t\t\t\t// embryo (skb1) was not\n\t\t\t\t\t\t// reachable from L yet, so V\u0027s\n\t\t\t\t\t\t// inflight remains unchanged\n__skb_queue_tail(L, skb1)\nunix_state_unlock(L)\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t if (u.inflight)\n\t\t\t\t\t\t scan_children(u, inc_inflight_move_tail)\n\n\t\t\t\t\t\t// V count=1 inflight=2 (!)\n\nIf there is a GC-candidate listening socket, lock/unlock its state. This\nmakes GC wait until the end of any ongoing connect() to that socket. After\nflipping the lock, a possibly SCM-laden embryo is already enqueued. And if\nthere is another embryo coming, it can not possibly carry SCM_RIGHTS. At\nthis point, unix_inflight() can not happen because unix_gc_lock is already\ntaken. Inflight graph remains unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26923",
"url": "https://www.suse.com/security/cve/CVE-2024-26923"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-26923",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1223683 for CVE-2024-26923",
"url": "https://bugzilla.suse.com/1223683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "moderate"
}
],
"title": "CVE-2024-26923"
},
{
"cve": "CVE-2024-36964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000\u0027s perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36964",
"url": "https://www.suse.com/security/cve/CVE-2024-36964"
},
{
"category": "external",
"summary": "SUSE Bug 1225866 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "external",
"summary": "SUSE Bug 1226325 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1226325"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "important"
}
],
"title": "CVE-2024-36964"
},
{
"cve": "CVE-2024-38599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38599"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\njffs2: prevent xattr node from overflowing the eraseblock\n\nAdd a check to make sure that the requested xattr node size is no larger\nthan the eraseblock minus the cleanmarker.\n\nUnlike the usual inode nodes, the xattr nodes aren\u0027t split into parts\nand spread across multiple eraseblocks, which means that a xattr node\nmust not occupy more than one eraseblock. If the requested xattr value is\ntoo large, the xattr node can spill onto the next eraseblock, overwriting\nthe nodes and causing errors such as:\n\njffs2: argh. node added in wrong place at 0x0000b050(2)\njffs2: nextblock 0x0000a000, expected at 0000b00c\njffs2: error: (823) do_verify_xattr_datum: node CRC failed at 0x01e050,\nread=0xfc892c93, calc=0x000000\njffs2: notice: (823) jffs2_get_inode_nodes: Node header CRC failed\nat 0x01e00c. {848f,2fc4,0fef511f,59a3d171}\njffs2: Node at 0x0000000c with length 0x00001044 would run over the\nend of the erase block\njffs2: Perhaps the file system was created with the wrong erase size?\njffs2: jffs2_scan_eraseblock(): Magic bitmask 0x1985 not found\nat 0x00000010: 0x1044 instead\n\nThis breaks the filesystem and can lead to KASAN crashes such as:\n\nBUG: KASAN: slab-out-of-bounds in jffs2_sum_add_kvec+0x125e/0x15d0\nRead of size 4 at addr ffff88802c31e914 by task repro/830\nCPU: 0 PID: 830 Comm: repro Not tainted 6.9.0-rc3+ #1\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996),\nBIOS Arch Linux 1.16.3-1-1 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0xc6/0x120\n print_report+0xc4/0x620\n ? __virt_addr_valid+0x308/0x5b0\n kasan_report+0xc1/0xf0\n ? jffs2_sum_add_kvec+0x125e/0x15d0\n ? jffs2_sum_add_kvec+0x125e/0x15d0\n jffs2_sum_add_kvec+0x125e/0x15d0\n jffs2_flash_direct_writev+0xa8/0xd0\n jffs2_flash_writev+0x9c9/0xef0\n ? __x64_sys_setxattr+0xc4/0x160\n ? do_syscall_64+0x69/0x140\n ? entry_SYSCALL_64_after_hwframe+0x76/0x7e\n [...]\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38599",
"url": "https://www.suse.com/security/cve/CVE-2024-38599"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-38599",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1226848 for CVE-2024-38599",
"url": "https://bugzilla.suse.com/1226848"
},
{
"category": "external",
"summary": "SUSE Bug 1227283 for CVE-2024-38599",
"url": "https://bugzilla.suse.com/1227283"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "important"
}
],
"title": "CVE-2024-38599"
},
{
"cve": "CVE-2024-42145",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-42145"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/core: Implement a limit on UMAD receive List\n\nThe existing behavior of ib_umad, which maintains received MAD\npackets in an unbounded list, poses a risk of uncontrolled growth.\nAs user-space applications extract packets from this list, the rate\nof extraction may not match the rate of incoming packets, leading\nto potential list overflow.\n\nTo address this, we introduce a limit to the size of the list. After\nconsidering typical scenarios, such as OpenSM processing, which can\nhandle approximately 100k packets per second, and the 1-second retry\ntimeout for most packets, we set the list size limit to 200k. Packets\nreceived beyond this limit are dropped, assuming they are likely timed\nout by the time they are handled by user-space.\n\nNotably, packets queued on the receive list due to reasons like\ntimed-out sends are preserved even when the list is full.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-42145",
"url": "https://www.suse.com/security/cve/CVE-2024-42145"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1228743 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1228743"
},
{
"category": "external",
"summary": "SUSE Bug 1228744 for CVE-2024-42145",
"url": "https://bugzilla.suse.com/1228744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-default-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-ec2-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-source-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-syms-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-trace-devel-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-base-3.0.101-108.159.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4 LTSS EXTREME CORE:kernel-xen-devel-3.0.101-108.159.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-08-13T14:08:42Z",
"details": "important"
}
],
"title": "CVE-2024-42145"
}
]
}
suse-su-2021:3675-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe following security bugs were fixed:\n\n- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).\n- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).\n- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).\n- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).\n- CVE-2021-33033: Fixed a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled (bsc#1186109).\n- CVE-2021-34866: Fixed eBPF Type Confusion Privilege Escalation Vulnerability (bsc#1191645).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).\n- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).\n- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).\n- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).\n- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).\n- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n\nThe following non-security bugs were fixed:\n\n- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).\n- ACPI: bgrt: Fix CFI violation (git-fixes).\n- ACPI: fix NULL pointer dereference (git-fixes).\n- ACPI: NFIT: Use fallback node id when numa info in NFIT table is incorrect (git-fixes).\n- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).\n- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).\n- ALSA: hda - Enable headphone mic on Dell Latitude laptops with ALC3254 (git-fixes).\n- ALSA: hda: intel: Allow repeatedly probing on codec configuration errors (bsc#1190801).\n- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).\n- ALSA: hda/realtek: Add quirk for TongFang PHxTxX1 (git-fixes).\n- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).\n- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output for Dell Precision 5560 laptop (git-fixes).\n- ALSA: hda/realtek: Fix for quirk to enable speaker output on the Lenovo 13s Gen2 (git-fixes).\n- ALSA: hda/realtek: Fix mic mute LED for the HP Spectre x360 14 (git-fixes).\n- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).\n- ALSA: hda/realtek: Quirks to enable speaker output for Lenovo Legion 7i 15IMHG05, Yoga 7i 14ITL5/15ITL5, and 13s Gen2 laptops (git-fixes).\n- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).\n- ALSA: hda: Use position buffer for SKL+ again (git-fixes).\n- ALSA: pcm: Workaround for a wrong offset in SYNC_PTR compat ioctl (git-fixes).\n- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).\n- ALSA: ua101: fix division by zero at probe (git-fixes).\n- ALSA: uapi: Fix a C++ style comment in asound.h (git-fixes).\n- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).\n- ASoC: atmel: ATMEL drivers do not need HAS_DMA (git-fixes).\n- ASoC: cs42l42: Correct some register default values (git-fixes).\n- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).\n- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).\n- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).\n- ASoC: dapm: use component prefix when checking widget names (git-fixes).\n- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).\n- ASoC: fsl_spdif: register platform component before registering cpu dai (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Move \u0027Platform Clock\u0027 routes to the maps for the matching in-/output (git-fixes).\n- ASoC: Intel: Skylake: Fix module configuration for KPB and MIXER (git-fixes).\n- ASoC: Intel: Skylake: Fix passing loadable flag for module (git-fixes).\n- ASoC: Intel: sof_sdw: tag SoundWire BEs as non-atomic (git-fixes).\n- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).\n- ASoC: rockchip: Use generic dmaengine code (git-fixes).\n- ASoC: SOF: imx: imx8: Bar index is only valid for IRAM and SRAM types (git-fixes).\n- ASoC: SOF: imx: imx8m: Bar index is only valid for IRAM and SRAM types (git-fixes).\n- ASoC: SOF: loader: release_firmware() on load failure to avoid batching (git-fixes).\n- ASoC: SOF: topology: do not power down primary core during topology removal (git-fixes).\n- ASoC: topology: Fix stub for snd_soc_tplg_component_remove() (git-fixes).\n- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).\n- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).\n- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).\n- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).\n- ath10k: fix control-message timeout (git-fixes).\n- ath10k: fix division by zero in send path (git-fixes).\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).\n- ath10k: sdio: Add missing BH locking around napi_schdule() (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).\n- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).\n- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).\n- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).\n- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).\n- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).\n- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).\n- bnxt_en: make bnxt_free_skbs() safe to call after bnxt_free_mem() (jsc#SLE-16649).\n- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).\n- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).\n- bpf: Fix OOB read when printing XDP link fdinfo (git-fixes).\n- bpf: Fix up bpf_skb_adjust_room helper\u0027s skb csum setting (git-fixes).\n- can: dev: can_restart: fix use after free bug (git-fixes).\n- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).\n- can: peak_usb: fix use after free bugs (git-fixes).\n- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).\n- can: rcar_can: fix suspend/resume (git-fixes).\n- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).\n- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).\n- cb710: avoid NULL pointer subtraction (git-fixes).\n- ceph: fix handling of \u0027meta\u0027 errors (bsc#1192041).\n- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).\n- cfg80211: correct bridge/4addr mode check (git-fixes).\n- cfg80211: fix management registrations locking (git-fixes).\n- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).\n- Configure mpi3mr as currently unsupported (jsc#SLE-18120)\n- cpuidle: pseries: Mark pseries_idle_proble() as __init (jsc#SLE-13614 bsc#1176914 ltc#186394 git-fixes).\n- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).\n- drm/amd/display: Pass PCI deviceid into DC (git-fixes).\n- drm/amdgpu: correct initial cp_hqd_quantum for gfx9 (git-fixes).\n- drm/amdgpu/display: add quirk handling for stutter mode (git-fixes).\n- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).\n- drm/amdgpu: fix warning for overflow check (git-fixes).\n- drm/amdgpu/gmc6: fix DMA mask from 44 to 40 bits (git-fixes).\n- drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read (git-fixes).\n- drm/i915: Fix syncmap memory leak (bsc#1152489) Backporting notes: \t* context changes in intel_timeline_fini()\n- drm/msm: Avoid potential overflow in timeout_to_jiffies() (git-fixes).\n- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).\n- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).\n- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).\n- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).\n- drm/msm: potential error pointer dereference in init() (git-fixes).\n- drm/msm: uninitialized variable in msm_gem_import() (git-fixes).\n- drm/nouveau: avoid a use-after-free when BO init fails (bsc#1152472)\n- drm/nouveau/debugfs: fix file release memory leak (git-fixes).\n- drm/nouveau/kms/nv50-: fix file release memory leak (git-fixes).\n- drm/nouveau/kms/tu102-: delay enabling cursor until after assign_windows (git-fixes).\n- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).\n- drm/panfrost: Make sure MMU context lifetime is not bound to (bsc#1152472)\n- drm/sun4i: dw-hdmi: Fix HDMI PHY clock setup (git-fixes).\n- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).\n- drm/ttm: stop calling tt_swapin in vm_access (git-fixes).\n- drm/v3d: fix wait for TMU write combiner flush (git-fixes).\n- e1000e: Drop patch to avoid regressions until real fix is available (bsc#1191663).\n- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).\n- e100: fix buffer overrun in e100_get_regs (git-fixes).\n- e100: fix length calculation in e100_get_regs_len (git-fixes).\n- e100: handle eeprom as little endian (git-fixes).\n- EDAC/amd64: Set proper family type for Family 19h Models 20h-2Fh (bsc#1192288).\n- ext4: fix reserved space counter leakage (bsc#1191450).\n- ext4: report correct st_size for encrypted symlinks (bsc#1191449).\n- firmware/psci: fix application of sizeof to pointer (git-fixes).\n- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).\n- fs, mm: fix race in unlinking swapfile (bsc#1191455).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).\n- gpio: pca953x: Improve bias setting (git-fixes).\n- gve: Avoid freeing NULL pointer (git-fixes).\n- gve: Correct available tx qpl check (git-fixes).\n- gve: fix gve_get_stats() (git-fixes).\n- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).\n- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).\n- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).\n- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).\n- HID: u2fzero: ignore incomplete packets without data (git-fixes).\n- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).\n- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).\n- hso: fix bailout in error case of probe (git-fixes).\n- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).\n- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).\n- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).\n- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).\n- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).\n- i40e: Fix ATR queue selection (git-fixes).\n- i40e: fix endless loop under rtnl (git-fixes).\n- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).\n- iavf: fix double unlock of crit_lock (git-fixes).\n- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).\n- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).\n- ice: fix getting UDP tunnel entry (jsc#SLE-12878).\n- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).\n- iio: adc128s052: Fix the error handling path of \u0027adc128_probe()\u0027 (git-fixes).\n- iio: adc: aspeed: set driver data when adc probe (git-fixes).\n- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).\n- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).\n- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).\n- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).\n- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).\n- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).\n- Input: snvs_pwrkey - add clk handling (git-fixes).\n- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).\n- ionic: do not remove netdev-\u003edev_addr when syncing uc list (bsc#1167773).\n- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).\n- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).\n- isdn: cpai: check ctr-\u003ecnr to avoid array index out of bound (git-fixes).\n- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).\n- iwlwifi: mvm: fix some kerneldoc issues (git-fixes).\n- iwlwifi: pcie: add configuration of a Wi-Fi adapter on Dell XPS 15 (git-fixes).\n- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).\n- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).\n- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).\n- kABI workaround for cfg80211 mgmt_registration_lock changes (git-fixes).\n- kABI workaround for HD-audio probe retry changes (bsc#1190801).\n- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).\n- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).\n- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 (\u0027rpm: Abolish scritplet templating (bsc#1189841).\u0027)\n- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229). \n- KVM: PPC: Book3S HV: Fix copy_tofrom_guest routines (jsc#SLE-12936 git-fixes).\n- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).\n- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).\n- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).\n- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).\n- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).\n- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).\n- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).\n- KVM: s390: index kvm-\u003earch.idle_mask by vcpu_idx (bsc#1133021).\n- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).\n- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).\n- lan78xx: select CRC32 (git-fixes).\n- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- mac80211: check return value of rhashtable_init (git-fixes).\n- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).\n- media: cedrus: Fix SUNXI tile size calculation (git-fixes).\n- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).\n- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).\n- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: add missing em28xx_close_extension (git-fixes).\n- media: em28xx: Do not use ops-\u003esuspend if it is NULL (git-fixes).\n- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).\n- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).\n- media: mtk-vpu: Fix a resource leak in the error handling path of \u0027mtk_vpu_probe()\u0027 (git-fixes).\n- media: mxl111sf: change mutex_init() location (git-fixes).\n- media: radio-wl1273: Avoid card name truncation (git-fixes).\n- media: si470x: Avoid card name truncation (git-fixes).\n- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).\n- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).\n- media: tm6000: Avoid card name truncation (git-fixes).\n- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- mei: me: add Ice Lake-N device id (git-fixes).\n- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).\n- memstick: avoid out-of-range warning (git-fixes).\n- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).\n- mlx5: count all link events (git-fixes).\n- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).\n- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).\n- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).\n- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).\n- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).\n- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).\n- mmc: vub300: fix control-message timeouts (git-fixes).\n- mt76: mt7615: fix endianness warning in mt7615_mac_write_txwi (git-fixes).\n- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).\n- mt76: mt7915: fix muar_idx in mt7915_mcu_alloc_sta_req() (git-fixes).\n- mt76: mt7915: fix possible infinite loop release semaphore (git-fixes).\n- mt76: mt7915: fix sta_rec_wtbl tag len (git-fixes).\n- mwifiex: fix division by zero in fw download path (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).\n- net: batman-adv: fix error handling (git-fixes).\n- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).\n- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).\n- net: cdc_eem: fix tx fixup skb leak (git-fixes).\n- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).\n- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).\n- netfilter: Drop fragmented ndisc packets assembled in netfilter (git-fixes).\n- netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value (bsc#1176447).\n- net: hns3: check queue id range before using (jsc#SLE-14777).\n- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).\n- net: hso: add failure handler for add_net_device (git-fixes).\n- net: hso: fix NULL-deref on disconnect regression (git-fixes).\n- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).\n- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).\n- net: lan78xx: fix division by zero in send path (git-fixes).\n- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).\n- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).\n- net/mlx4_en: Resolve bad operstate value (git-fixes).\n- net/mlx5e: IPSEC RX, enable checksum complete (jsc#SLE-15172).\n- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).\n- net/mlx5e: RX, Avoid possible data corruption when relaxed ordering and LRO combined (jsc#SLE-15172).\n- net/mlx5: E-Switch, Fix double allocation of acl flow counter (jsc#SLE-15172).\n- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).\n- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).\n- net/sched: ets: fix crash when flipping from \u0027strict\u0027 to \u0027quantum\u0027 (bsc#1176774).\n- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).\n- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).\n- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).\n- nfc: fix error handling of nfc_proto_register() (git-fixes).\n- nfc: port100: fix using -ERRNO as command type mask (git-fixes).\n- nfs: dir_cookie is a pointer to the cookie in older kernels, not the cookie itself. (bsc#1191628 bsc#1192549).\n- NFS: Do uncached readdir when we\u0027re seeking a cookie in an empty page cache (bsc#1191628).\n- nvme: add command id quirk for apple controllers (git-fixes).\n- nvme-fc: avoid race between time out and tear down (bsc#1185762).\n- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).\n- nvme-fc: update hardware queues before using them (bsc#1185762).\n- nvme-pci: Fix abort command id (git-fixes).\n- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).\n- nvme-pci: refactor nvme_unmap_data (bsc#1191934).\n- nvme-pci: set min_align_mask (bsc#1191851).\n- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).\n- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).\n- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).\n- phy: mdio: fix memory leak (git-fixes).\n- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).\n- platform/mellanox: mlxreg-io: Fix read access of n-bytes size attributes (git-fixes).\n- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).\n- platform/x86: intel_scu_ipc: Fix busy loop expiry time (git-fixes).\n- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (git-fixes).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails (git-fixes).\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (git-fixes).\n- PM / devfreq: rk3399_dmc: Fix spelling typo (git-fixes).\n- PM / devfreq: rk3399_dmc: Remove unneeded semicolon (git-fixes).\n- PM: sleep: Do not let \u0027syscore\u0027 devices runtime-suspend during system transitions (git-fixes).\n- powerpc/64s: Fix entry flush patching w/strict RWX \u0026 hash (jsc#SLE-13847 git-fixes).\n- powerpc/64s: Fix stf mitigation patching w/strict RWX \u0026 hash (jsc#SLE-13847 git-fixes).\n- powerpc/64s: Remove irq mask workaround in accumulate_stolen_time() (jsc#SLE-9246 git-fixes).\n- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).\n- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).\n- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).\n- powerpc: Do not dereference code as \u0027struct ppc_inst\u0027 (uprobe, code-patching, feature-fixups) (jsc#SLE-13847 git-fixes).\n- powerpc: Do not use \u0027struct ppc_inst\u0027 to reference instruction location (jsc#SLE-13847 git-fixes).\n- powerpc/lib/code-patching: Do not use struct \u0027ppc_inst\u0027 for runnable code in tests (jsc#SLE-13847 git-fixes).\n- powerpc/lib/code-patching: Make instr_is_branch_to_addr() static (jsc#SLE-13847 git-fixes).\n- powerpc/lib: Fix emulate_step() std test (bsc#1065729).\n- powerpc: Move arch_cpu_idle_dead() into smp.c (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/numa: Update cpu_cpu_map on CPU online/offline (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).\n- powerpc/smp: Cache CPU to chip lookup (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/smp: Enable CACHE domain for shared processor (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/smp: Fix a crash while booting kvm guest with nr_cpus=2 (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/smp: Fold cpu_die() into its only caller (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/smp: Set numa node before updating mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/smp: Update cpu_core_map on all PowerPc systems (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/uprobes: Validation for prefixed instruction (jsc#SLE-13847 git-fixes).\n- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).\n- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).\n- ptp_pch: Load module automatically if ID matches (git-fixes).\n- ptp_pch: Restore dependency on PCI (git-fixes).\n- qed: Fix missing error code in qed_slowpath_start() (git-fixes).\n- qed: Handle management FW error (git-fixes).\n- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr.ss_family (bsc#1181147).\n- RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure (bsc#1181147).\n- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).\n- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).\n- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).\n- rpm: fix kmp install path\n- rpm: use _rpmmacrodir (boo#1191384)\n- rsi: fix control-message timeout (git-fixes).\n- rsi: Fix module dev_oper_mode parameter description (git-fixes).\n- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- scsi: ibmvfc: Fix up duplicate response detection (bsc#1191867 ltc#194757).\n- scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim (git-fixes).\n- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).\n- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).\n- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).\n- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).\n- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).\n- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).\n- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).\n- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).\n- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).\n- scsi: mpi3mr: Add bios_param SCSI host template hook (jsc#SLE-18120).\n- scsi: mpi3mr: Add change queue depth support (jsc#SLE-18120).\n- scsi: mpi3mr: Add EEDP DIF DIX support (jsc#SLE-18120).\n- scsi: mpi3mr: Add event handling debug prints (jsc#SLE-18120).\n- scsi: mpi3mr: Additional event handling (jsc#SLE-18120).\n- scsi: mpi3mr: Add mpi30 Rev-R headers and Kconfig (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for device add/remove event handling (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for DSN secure firmware check (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for internal watchdog thread (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for PCIe device event handling (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for PM suspend and resume (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for queue command processing (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for recovering controller (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for threaded ISR (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for timestamp sync with firmware (jsc#SLE-18120).\n- scsi: mpi3mr: Allow certain commands during pci-remove hook (jsc#SLE-18120).\n- scsi: mpi3mr: Base driver code (jsc#SLE-18120).\n- scsi: mpi3mr: Complete support for soft reset (jsc#SLE-18120).\n- scsi: mpi3mr: Create operational request and reply queue pair (jsc#SLE-18120).\n- scsi: mpi3mr: Fix error handling in mpi3mr_setup_isr() (git-fixes).\n- scsi: mpi3mr: Fix missing unlock on error (git-fixes).\n- scsi: mpi3mr: Hardware workaround for UNMAP commands to NVMe drives (jsc#SLE-18120).\n- scsi: mpi3mr: Implement SCSI error handler hooks (jsc#SLE-18120).\n- scsi: mpi3mr: Print IOC info for debugging (jsc#SLE-18120).\n- scsi: mpi3mr: Print pending host I/Os for debugging (jsc#SLE-18120).\n- scsi: mpi3mr: Set up IRQs in resume path (jsc#SLE-18120).\n- scsi: mpi3mr: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (jsc#SLE-18120).\n- scsi: mpi3mr: Use the proper SCSI midlayer interfaces for PI (jsc#SLE-18120).\n- scsi: mpi3mr: Wait for pending I/O completions upon detection of VD I/O timeout (jsc#SLE-18120).\n- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).\n- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).\n- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).\n- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).\n- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).\n- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).\n- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).\n- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).\n- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).\n- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).\n- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).\n- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).\n- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).\n- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).\n- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).\n- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).\n- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).\n- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).\n- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).\n- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).\n- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).\n- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).\n- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).\n- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).\n- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).\n- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).\n- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).\n- scsi: qla2xxx: Fix port type info (bsc#1190941).\n- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).\n- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).\n- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).\n- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).\n- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).\n- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).\n- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).\n- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).\n- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).\n- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).\n- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).\n- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).\n- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).\n- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).\n- scsi: target: Fix the pgr/alua_support_store functions (git-fixes).\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).\n- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).\n- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).\n- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).\n- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).\n- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).\n- swiotlb: factor out a nr_slots helper (bsc#1191851).\n- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).\n- swiotlb: respect min_align_mask (bsc#1191851).\n- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).\n- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).\n- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).\n- Update patch reference for AMDGPU fix (bsc#1180749)\n- USB: cdc-acm: clean up probe error labels (git-fixes).\n- USB: cdc-acm: fix minor-number release (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Also search for \u0027phys\u0027 phandle (git-fixes).\n- usb: hso: fix error handling code of hso_create_net_device (git-fixes).\n- usb: hso: remove the bailout parameter (git-fixes).\n- usb: musb: dsps: Fix the probe error path (git-fixes).\n- usbnet: fix error return code in usbnet_probe() (git-fixes).\n- usbnet: sanity check for maxpacket (git-fixes).\n- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).\n- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).\n- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).\n- USB: serial: qcserial: add EM9191 QDL support (git-fixes).\n- USB: xhci: dbc: fix tty registration race (git-fixes).\n- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).\n- virtio-gpu: fix possible memory allocation failure (git-fixes).\n- virtio: write back F_VERSION_1 before validate (git-fixes).\n- watchdog: orion: use 0 for unset heartbeat (git-fixes).\n- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two\u0027s complement (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1152489).\n- x86/msi: Force affinity setup before startup (bsc#1152489).\n- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).\n- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).\n- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).\n- x86/sev: Return an error on a returned non-zero SW_EXITINFO1[31:0] (bsc#1178134).\n- xen: fix setting of max_pfn in shared_info (git-fixes).\n- xen: reset legacy rtc flag for PV domU (git-fixes).\n- xfs: do not allow log writes if the data device is readonly (bsc#1192229).\n- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).\n- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006). \n- xfs: fix I_DONTCACHE (bsc#1192074).\n- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).\n- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).\n- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).\n- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).\n- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).\n- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3675,SUSE-SLE-Module-Basesystem-15-SP3-2021-3675,SUSE-SLE-Module-Development-Tools-15-SP3-2021-3675,SUSE-SLE-Module-Legacy-15-SP3-2021-3675,SUSE-SLE-Module-Live-Patching-15-SP3-2021-3675,SUSE-SLE-Product-HA-15-SP3-2021-3675,SUSE-SLE-Product-WE-15-SP3-2021-3675,SUSE-SUSE-MicroOS-5.1-2021-3675",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3675-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3675-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213675-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3675-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085030",
"url": "https://bugzilla.suse.com/1085030"
},
{
"category": "self",
"summary": "SUSE Bug 1089118",
"url": "https://bugzilla.suse.com/1089118"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1157177",
"url": "https://bugzilla.suse.com/1157177"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1172073",
"url": "https://bugzilla.suse.com/1172073"
},
{
"category": "self",
"summary": "SUSE Bug 1173604",
"url": "https://bugzilla.suse.com/1173604"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1176914",
"url": "https://bugzilla.suse.com/1176914"
},
{
"category": "self",
"summary": "SUSE Bug 1176940",
"url": "https://bugzilla.suse.com/1176940"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1180100",
"url": "https://bugzilla.suse.com/1180100"
},
{
"category": "self",
"summary": "SUSE Bug 1180749",
"url": "https://bugzilla.suse.com/1180749"
},
{
"category": "self",
"summary": "SUSE Bug 1181147",
"url": "https://bugzilla.suse.com/1181147"
},
{
"category": "self",
"summary": "SUSE Bug 1184673",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "self",
"summary": "SUSE Bug 1185762",
"url": "https://bugzilla.suse.com/1185762"
},
{
"category": "self",
"summary": "SUSE Bug 1186063",
"url": "https://bugzilla.suse.com/1186063"
},
{
"category": "self",
"summary": "SUSE Bug 1186109",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "self",
"summary": "SUSE Bug 1187167",
"url": "https://bugzilla.suse.com/1187167"
},
{
"category": "self",
"summary": "SUSE Bug 1188563",
"url": "https://bugzilla.suse.com/1188563"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1189841",
"url": "https://bugzilla.suse.com/1189841"
},
{
"category": "self",
"summary": "SUSE Bug 1190006",
"url": "https://bugzilla.suse.com/1190006"
},
{
"category": "self",
"summary": "SUSE Bug 1190067",
"url": "https://bugzilla.suse.com/1190067"
},
{
"category": "self",
"summary": "SUSE Bug 1190349",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "self",
"summary": "SUSE Bug 1190351",
"url": "https://bugzilla.suse.com/1190351"
},
{
"category": "self",
"summary": "SUSE Bug 1190479",
"url": "https://bugzilla.suse.com/1190479"
},
{
"category": "self",
"summary": "SUSE Bug 1190620",
"url": "https://bugzilla.suse.com/1190620"
},
{
"category": "self",
"summary": "SUSE Bug 1190642",
"url": "https://bugzilla.suse.com/1190642"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1190801",
"url": "https://bugzilla.suse.com/1190801"
},
{
"category": "self",
"summary": "SUSE Bug 1190941",
"url": "https://bugzilla.suse.com/1190941"
},
{
"category": "self",
"summary": "SUSE Bug 1191229",
"url": "https://bugzilla.suse.com/1191229"
},
{
"category": "self",
"summary": "SUSE Bug 1191240",
"url": "https://bugzilla.suse.com/1191240"
},
{
"category": "self",
"summary": "SUSE Bug 1191241",
"url": "https://bugzilla.suse.com/1191241"
},
{
"category": "self",
"summary": "SUSE Bug 1191315",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "self",
"summary": "SUSE Bug 1191317",
"url": "https://bugzilla.suse.com/1191317"
},
{
"category": "self",
"summary": "SUSE Bug 1191349",
"url": "https://bugzilla.suse.com/1191349"
},
{
"category": "self",
"summary": "SUSE Bug 1191384",
"url": "https://bugzilla.suse.com/1191384"
},
{
"category": "self",
"summary": "SUSE Bug 1191449",
"url": "https://bugzilla.suse.com/1191449"
},
{
"category": "self",
"summary": "SUSE Bug 1191450",
"url": "https://bugzilla.suse.com/1191450"
},
{
"category": "self",
"summary": "SUSE Bug 1191451",
"url": "https://bugzilla.suse.com/1191451"
},
{
"category": "self",
"summary": "SUSE Bug 1191452",
"url": "https://bugzilla.suse.com/1191452"
},
{
"category": "self",
"summary": "SUSE Bug 1191455",
"url": "https://bugzilla.suse.com/1191455"
},
{
"category": "self",
"summary": "SUSE Bug 1191456",
"url": "https://bugzilla.suse.com/1191456"
},
{
"category": "self",
"summary": "SUSE Bug 1191628",
"url": "https://bugzilla.suse.com/1191628"
},
{
"category": "self",
"summary": "SUSE Bug 1191645",
"url": "https://bugzilla.suse.com/1191645"
},
{
"category": "self",
"summary": "SUSE Bug 1191663",
"url": "https://bugzilla.suse.com/1191663"
},
{
"category": "self",
"summary": "SUSE Bug 1191731",
"url": "https://bugzilla.suse.com/1191731"
},
{
"category": "self",
"summary": "SUSE Bug 1191800",
"url": "https://bugzilla.suse.com/1191800"
},
{
"category": "self",
"summary": "SUSE Bug 1191851",
"url": "https://bugzilla.suse.com/1191851"
},
{
"category": "self",
"summary": "SUSE Bug 1191867",
"url": "https://bugzilla.suse.com/1191867"
},
{
"category": "self",
"summary": "SUSE Bug 1191934",
"url": "https://bugzilla.suse.com/1191934"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1191980",
"url": "https://bugzilla.suse.com/1191980"
},
{
"category": "self",
"summary": "SUSE Bug 1192040",
"url": "https://bugzilla.suse.com/1192040"
},
{
"category": "self",
"summary": "SUSE Bug 1192041",
"url": "https://bugzilla.suse.com/1192041"
},
{
"category": "self",
"summary": "SUSE Bug 1192074",
"url": "https://bugzilla.suse.com/1192074"
},
{
"category": "self",
"summary": "SUSE Bug 1192107",
"url": "https://bugzilla.suse.com/1192107"
},
{
"category": "self",
"summary": "SUSE Bug 1192145",
"url": "https://bugzilla.suse.com/1192145"
},
{
"category": "self",
"summary": "SUSE Bug 1192229",
"url": "https://bugzilla.suse.com/1192229"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 1192288",
"url": "https://bugzilla.suse.com/1192288"
},
{
"category": "self",
"summary": "SUSE Bug 1192549",
"url": "https://bugzilla.suse.com/1192549"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33033 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34866 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34866/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3655 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3715 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3760 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3772 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3896 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41864 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42008 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42252 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43056 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-11-16T16:48:20Z",
"generator": {
"date": "2021-11-16T16:48:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3675-1",
"initial_release_date": "2021-11-16T16:48:20Z",
"revision_history": [
{
"date": "2021-11-16T16:48:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-59.34.1.aarch64",
"product_id": "dtb-al-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-59.34.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-59.34.1.aarch64",
"product_id": "dtb-altera-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-59.34.1.aarch64",
"product_id": "dtb-amd-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-59.34.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-59.34.1.aarch64",
"product_id": "dtb-apm-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-59.34.1.aarch64",
"product_id": "dtb-arm-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-59.34.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-59.34.1.aarch64",
"product_id": "dtb-cavium-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-59.34.1.aarch64",
"product_id": "dtb-exynos-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-59.34.1.aarch64",
"product_id": "dtb-freescale-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-59.34.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-59.34.1.aarch64",
"product_id": "dtb-lg-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-59.34.1.aarch64",
"product_id": "dtb-marvell-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-59.34.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-59.34.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-59.34.1.aarch64",
"product_id": "dtb-qcom-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-59.34.1.aarch64",
"product_id": "dtb-renesas-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-59.34.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-59.34.1.aarch64",
"product_id": "dtb-socionext-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-59.34.1.aarch64",
"product_id": "dtb-sprd-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-59.34.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-59.34.1.aarch64",
"product_id": "dtb-zte-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.34.1.aarch64",
"product_id": "kernel-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"product_id": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.34.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.34.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.34.1.aarch64",
"product_id": "kernel-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.34.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.34.1.noarch",
"product_id": "kernel-devel-5.3.18-59.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.34.1.noarch",
"product_id": "kernel-docs-5.3.18-59.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.34.1.noarch",
"product_id": "kernel-docs-html-5.3.18-59.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.34.1.noarch",
"product_id": "kernel-macros-5.3.18-59.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-source-5.3.18-59.34.1.noarch",
"product_id": "kernel-source-5.3.18-59.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.34.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.34.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-debug-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"product": {
"name": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"product_id": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.34.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"product_id": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-devel-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-extra-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-optional-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"product": {
"name": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"product_id": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.34.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.34.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.34.1.s390x",
"product_id": "kernel-syms-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.34.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.34.1.x86_64",
"product_id": "kernel-debug-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"product_id": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-5_3_18-59_34-preempt-1-7.3.1.x86_64",
"product": {
"name": "kernel-livepatch-5_3_18-59_34-preempt-1-7.3.1.x86_64",
"product_id": "kernel-livepatch-5_3_18-59_34-preempt-1-7.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.34.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.34.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.34.1.x86_64",
"product_id": "kernel-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.34.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-legacy:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.34.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.34.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.34.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.34.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.34.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.34.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.34.1.noarch as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch"
},
"product_reference": "kernel-source-5.3.18-59.34.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Module for Legacy 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Legacy 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP3",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64"
},
"product_reference": "kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP3",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33033"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33033",
"url": "https://www.suse.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "SUSE Bug 1186109 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "external",
"summary": "SUSE Bug 1186283 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186283"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-34866",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34866"
}
],
"notes": [
{
"category": "general",
"text": "This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34866",
"url": "https://www.suse.com/security/cve/CVE-2021-34866"
},
{
"category": "external",
"summary": "SUSE Bug 1191645 for CVE-2021-34866",
"url": "https://bugzilla.suse.com/1191645"
},
{
"category": "external",
"summary": "SUSE Bug 1191646 for CVE-2021-34866",
"url": "https://bugzilla.suse.com/1191646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "important"
}
],
"title": "CVE-2021-34866"
},
{
"cve": "CVE-2021-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3542",
"url": "https://www.suse.com/security/cve/CVE-2021-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1186063 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1186063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "important"
}
],
"title": "CVE-2021-3542"
},
{
"cve": "CVE-2021-3655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3655"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3655",
"url": "https://www.suse.com/security/cve/CVE-2021-3655"
},
{
"category": "external",
"summary": "SUSE Bug 1188563 for CVE-2021-3655",
"url": "https://bugzilla.suse.com/1188563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "low"
}
],
"title": "CVE-2021-3655"
},
{
"cve": "CVE-2021-3715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3715"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3715",
"url": "https://www.suse.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "SUSE Bug 1190349 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "external",
"summary": "SUSE Bug 1190350 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190350"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1196722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "important"
}
],
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-3760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3760"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3760",
"url": "https://www.suse.com/security/cve/CVE-2021-3760"
},
{
"category": "external",
"summary": "SUSE Bug 1190067 for CVE-2021-3760",
"url": "https://bugzilla.suse.com/1190067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-3760"
},
{
"cve": "CVE-2021-3772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3772"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3772",
"url": "https://www.suse.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "SUSE Bug 1190351 for CVE-2021-3772",
"url": "https://bugzilla.suse.com/1190351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-3772"
},
{
"cve": "CVE-2021-3896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3896"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3896",
"url": "https://www.suse.com/security/cve/CVE-2021-3896"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-3896",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-3896"
},
{
"cve": "CVE-2021-41864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41864"
}
],
"notes": [
{
"category": "general",
"text": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41864",
"url": "https://www.suse.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "SUSE Bug 1191317 for CVE-2021-41864",
"url": "https://bugzilla.suse.com/1191317"
},
{
"category": "external",
"summary": "SUSE Bug 1191318 for CVE-2021-41864",
"url": "https://bugzilla.suse.com/1191318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "important"
}
],
"title": "CVE-2021-41864"
},
{
"cve": "CVE-2021-42008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42008"
}
],
"notes": [
{
"category": "general",
"text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42008",
"url": "https://www.suse.com/security/cve/CVE-2021-42008"
},
{
"category": "external",
"summary": "SUSE Bug 1191315 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "external",
"summary": "SUSE Bug 1191660 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191660"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "important"
}
],
"title": "CVE-2021-42008"
},
{
"cve": "CVE-2021-42252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42252"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42252",
"url": "https://www.suse.com/security/cve/CVE-2021-42252"
},
{
"category": "external",
"summary": "SUSE Bug 1190479 for CVE-2021-42252",
"url": "https://bugzilla.suse.com/1190479"
},
{
"category": "external",
"summary": "SUSE Bug 1192444 for CVE-2021-42252",
"url": "https://bugzilla.suse.com/1192444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "important"
}
],
"title": "CVE-2021-42252"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
},
{
"cve": "CVE-2021-43056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43056"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43056",
"url": "https://www.suse.com/security/cve/CVE-2021-43056"
},
{
"category": "external",
"summary": "SUSE Bug 1192107 for CVE-2021-43056",
"url": "https://bugzilla.suse.com/1192107"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-43056"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.s390x",
"SUSE Linux Enterprise Live Patching 15 SP3:kernel-livepatch-5_3_18-59_34-default-1-7.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Micro 5.1:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-devel-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-macros-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-preempt-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-docs-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-source-5.3.18-59.34.1.noarch",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:kernel-syms-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"SUSE Linux Enterprise Module for Legacy 15 SP3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"SUSE Linux Enterprise Workstation Extension 15 SP3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:20Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
suse-su-2021:3978-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux RT Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n- CVE-2020-27820: Fixed a use-after-free in nouveau\u0027s postclose() handler that could have happened during device or driver removal (bnc#1179599).\n\nThe following non-security bugs were fixed:\n\n- ABI: sysfs-kernel-slab: Document some stats (git-fixes).\n- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).\n- ALSA: ua101: fix division by zero at probe (git-fixes).\n- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).\n- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).\n- ASoC: cs42l42: Correct some register default values (git-fixes).\n- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).\n- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).\n- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).\n- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).\n- ASoC: rockchip: Use generic dmaengine code (git-fixes).\n- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).\n- ath10k: fix control-message timeout (git-fixes).\n- ath10k: fix division by zero in send path (git-fixes).\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).\n- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).\n- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).\n- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).\n- bnxt_en: reject indirect blk offload when hw-tc-offload is off (jsc#SLE-8372 bsc#1153275).\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).\n- bpf: Fix potential race in tail call compatibility check (git-fixes).\n- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).\n- btrfs: do not ignore error from btrfs_next_leaf() when inserting checksums (bsc#1193002).\n- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).\n- btrfs: fix fsync failure and transaction abort after writes to prealloc extents (bsc#1193002).\n- btrfs: fix lost inode on log replay after mix of fsync, rename and inode eviction (bsc#1192998).\n- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).\n- btrfs: fix race causing unnecessary inode logging during link and rename (bsc#1192998).\n- btrfs: make checksum item extension more efficient (bsc#1193002).\n- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).\n- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).\n- config: disable unprivileged BPF by default (jsc#SLE-22573)\n- crypto: caam - disable pkc for non-E SoCs (git-fixes).\n- crypto: qat - detect PFVF collision after ACK (git-fixes).\n- crypto: qat - disregard spurious PFVF interrupts (git-fixes).\n- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).\n- drm/amdgpu: fix warning for overflow check (git-fixes).\n- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).\n- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).\n- drm/v3d: fix wait for TMU write combiner flush (git-fixes).\n- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).\n- elfcore: fix building with clang (bsc#1169514).\n- exfat: fix erroneous discard when clear cluster bit (git-fixes).\n- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).\n- exfat: properly set s_time_gran (bsc#1192328).\n- exfat: truncate atimes to 2s granularity (bsc#1192328).\n- firmware/psci: fix application of sizeof to pointer (git-fixes).\n- fuse: fix page stealing (bsc#1192718).\n- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).\n- gpio: mpc8xxx: Use \u0027devm_gpiochip_add_data()\u0027 to simplify the code and avoid a leak (git-fixes).\n- gve: Add netif_set_xps_queue call (bsc#1176940).\n- gve: Add rx buffer pagecnt bias (bsc#1176940).\n- gve: Allow pageflips on larger pages (bsc#1176940).\n- gve: DQO: avoid unused variable warnings (bsc#1176940).\n- gve: Track RX buffer allocation failures (bsc#1176940).\n- HID: u2fzero: clarify error check and length calculations (git-fixes).\n- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).\n- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).\n- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).\n- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).\n- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).\n- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).\n- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).\n- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).\n- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).\n- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).\n- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).\n- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).\n- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).\n- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).\n- KVM: s390: index kvm-\u003earch.idle_mask by vcpu_idx (bsc#1133021).\n- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).\n- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- media: cedrus: Fix SUNXI tile size calculation (git-fixes).\n- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).\n- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).\n- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: add missing em28xx_close_extension (git-fixes).\n- media: em28xx: Do not use ops-\u003esuspend if it is NULL (git-fixes).\n- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).\n- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).\n- media: mtk-vpu: Fix a resource leak in the error handling path of \u0027mtk_vpu_probe()\u0027 (git-fixes).\n- media: mxl111sf: change mutex_init() location (git-fixes).\n- media: radio-wl1273: Avoid card name truncation (git-fixes).\n- media: si470x: Avoid card name truncation (git-fixes).\n- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).\n- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).\n- media: tm6000: Avoid card name truncation (git-fixes).\n- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).\n- memstick: avoid out-of-range warning (git-fixes).\n- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).\n- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).\n- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).\n- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).\n- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).\n- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).\n- mwifiex: fix division by zero in fw download path (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).\n- net: mscc: ocelot: fix hardware timestamp dequeue logic.\n- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).\n- nvme-pci: set min_align_mask (bsc#1191851).\n- objtool: Support Clang non-section symbols in ORC generation (bsc#1169514).\n- ocfs2: do not zero pages beyond i_size (bsc#1190795).\n- ocfs2: fix data corruption on truncate (bsc#1190795).\n- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).\n- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).\n- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).\n- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).\n- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).\n- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).\n- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).\n- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).\n- PCI: aardvark: Do not unmask unused interrupts (git-fixes).\n- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).\n- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).\n- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).\n- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).\n- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).\n- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).\n- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).\n- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).\n- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).\n- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).\n- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).\n- power: supply: rt5033 battery: Change voltage values to ca 5V (git-fixes).\n- printk/console: Allow to disable console output by using console=\u0027\u0027 or console=null (bsc#1192753).\n- printk: handle blank console arguments passed in (bsc#1192753).\n- printk: Remove printk.h inclusion in percpu.h (bsc#1192987).\n- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).\n- r8152: add a helper function about setting EEE (git-fixes).\n- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).\n- r8152: Disable PLA MCU clock speed down (git-fixes).\n- r8152: disable U2P3 for RTL8153B (git-fixes).\n- r8152: divide the tx and rx bottom functions (git-fixes).\n- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).\n- r8152: fix runtime resume for linking change (git-fixes).\n- r8152: replace array with linking list for rx information (git-fixes).\n- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).\n- r8152: saving the settings of EEE (git-fixes).\n- r8152: separate the rx buffer size (git-fixes).\n- r8152: use alloc_pages for rx buffer (git-fixes).\n- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).\n- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).\n- Revert \u0027ibmvnic: check failover_pending in login response\u0027 (bsc#1190523 ltc#194510).\n- Revert \u0027platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes\u0027 (git-fixes).\n- Revert \u0027r8152: adjust the settings about MAC clock speed down for RTL8153\u0027 (git-fixes).\n- Revert \u0027scsi: ufs: fix a missing check of devm_reset_control_get\u0027 (git-fixes).\n- Revert \u0027x86/kvm: fix vcpu-id indexed array sizes\u0027 (git-fixes).\n- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).\n- rsi: fix control-message timeout (git-fixes).\n- rsi: Fix module dev_oper_mode parameter description (git-fixes).\n- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- s390/qeth: fix deadlock during failing recovery (git-fixes).\n- s390/qeth: Fix deadlock in remove_discipline (git-fixes).\n- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).\n- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).\n- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).\n- scsi: core: Fix spelling in a source code comment (git-fixes).\n- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).\n- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).\n- scsi: dc395: Fix error case unwinding (git-fixes).\n- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).\n- scsi: FlashPoint: Rename si_flags field (git-fixes).\n- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).\n- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).\n- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).\n- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).\n- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).\n- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).\n- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).\n- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).\n- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).\n- scsi: snic: Fix an error message (git-fixes).\n- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).\n- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).\n- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).\n- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).\n- staging: r8712u: fix control-message timeout (git-fixes).\n- staging: rtl8192u: fix control-message timeouts (git-fixes).\n- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).\n- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).\n- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).\n- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).\n- swiotlb: factor out a nr_slots helper (bsc#1191851).\n- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).\n- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).\n- swiotlb: respect min_align_mask (bsc#1191851).\n- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).\n- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).\n- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- usb: gadget: hid: fix error code in do_config() (git-fixes).\n- usb: iowarrior: fix control-message timeouts (git-fixes).\n- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).\n- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).\n- usb: serial: keyspan: fix memleak on probe errors (git-fixes).\n- usbnet: fix error return code in usbnet_probe() (git-fixes).\n- usbnet: sanity check for maxpacket (git-fixes).\n- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).\n- virtio-gpu: fix possible memory allocation failure (git-fixes).\n- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two\u0027s complement (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1152489).\n- x86/msi: Force affinity setup before startup (bsc#1152489).\n- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).\n- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).\n- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).\n- xen: Fix implicit type conversion (git-fixes).\n- xfs: do not allow log writes if the data device is readonly (bsc#1192229).\n- zram-avoid-race-between-zram_remove-and-disksize_sto.patch: (bsc#1170269).\n- zram-don-t-fail-to-remove-zram-during-unloading-modu.patch: (bsc#1170269).\n- zram-fix-race-between-zram_reset_device-and-disksize.patch: (bsc#1170269).\n- zram-replace-fsync_bdev-with-sync_blockdev.patch: (bsc#1170269).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3978,SUSE-SLE-Module-RT-15-SP2-2021-3978,SUSE-SUSE-MicroOS-5.0-2021-3978",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3978-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3978-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213978-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3978-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1153275",
"url": "https://bugzilla.suse.com/1153275"
},
{
"category": "self",
"summary": "SUSE Bug 1169263",
"url": "https://bugzilla.suse.com/1169263"
},
{
"category": "self",
"summary": "SUSE Bug 1169514",
"url": "https://bugzilla.suse.com/1169514"
},
{
"category": "self",
"summary": "SUSE Bug 1170269",
"url": "https://bugzilla.suse.com/1170269"
},
{
"category": "self",
"summary": "SUSE Bug 1176940",
"url": "https://bugzilla.suse.com/1176940"
},
{
"category": "self",
"summary": "SUSE Bug 1179599",
"url": "https://bugzilla.suse.com/1179599"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1190523",
"url": "https://bugzilla.suse.com/1190523"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191851",
"url": "https://bugzilla.suse.com/1191851"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1191980",
"url": "https://bugzilla.suse.com/1191980"
},
{
"category": "self",
"summary": "SUSE Bug 1192045",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "self",
"summary": "SUSE Bug 1192229",
"url": "https://bugzilla.suse.com/1192229"
},
{
"category": "self",
"summary": "SUSE Bug 1192273",
"url": "https://bugzilla.suse.com/1192273"
},
{
"category": "self",
"summary": "SUSE Bug 1192328",
"url": "https://bugzilla.suse.com/1192328"
},
{
"category": "self",
"summary": "SUSE Bug 1192718",
"url": "https://bugzilla.suse.com/1192718"
},
{
"category": "self",
"summary": "SUSE Bug 1192740",
"url": "https://bugzilla.suse.com/1192740"
},
{
"category": "self",
"summary": "SUSE Bug 1192745",
"url": "https://bugzilla.suse.com/1192745"
},
{
"category": "self",
"summary": "SUSE Bug 1192750",
"url": "https://bugzilla.suse.com/1192750"
},
{
"category": "self",
"summary": "SUSE Bug 1192753",
"url": "https://bugzilla.suse.com/1192753"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE Bug 1192802",
"url": "https://bugzilla.suse.com/1192802"
},
{
"category": "self",
"summary": "SUSE Bug 1192896",
"url": "https://bugzilla.suse.com/1192896"
},
{
"category": "self",
"summary": "SUSE Bug 1192906",
"url": "https://bugzilla.suse.com/1192906"
},
{
"category": "self",
"summary": "SUSE Bug 1192918",
"url": "https://bugzilla.suse.com/1192918"
},
{
"category": "self",
"summary": "SUSE Bug 1192987",
"url": "https://bugzilla.suse.com/1192987"
},
{
"category": "self",
"summary": "SUSE Bug 1192998",
"url": "https://bugzilla.suse.com/1192998"
},
{
"category": "self",
"summary": "SUSE Bug 1193002",
"url": "https://bugzilla.suse.com/1193002"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-27820 page",
"url": "https://www.suse.com/security/cve/CVE-2020-27820/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0941 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux RT Kernel",
"tracking": {
"current_release_date": "2021-12-09T10:12:22Z",
"generator": {
"date": "2021-12-09T10:12:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3978-1",
"initial_release_date": "2021-12-09T10:12:22Z",
"revision_history": [
{
"date": "2021-12-09T10:12:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-62.3.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-62.3.noarch",
"product_id": "kernel-devel-rt-5.3.18-62.3.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-62.3.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-62.3.noarch",
"product_id": "kernel-source-rt-5.3.18-62.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-62.2.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-62.3.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-62.3.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-62.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-62.2.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-62.2.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-62.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-62.3.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-62.3.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-62.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-62.2.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-62.2.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-62.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-62.3.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-62.3.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-62.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-62.2.x86_64",
"product": {
"name": "kernel-rt-5.3.18-62.2.x86_64",
"product_id": "kernel-rt-5.3.18-62.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-62.2.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-62.2.x86_64",
"product_id": "kernel-rt-devel-5.3.18-62.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-62.2.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-62.2.x86_64",
"product_id": "kernel-rt-extra-5.3.18-62.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-62.2.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-62.2.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-62.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-62.3.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-62.3.x86_64",
"product_id": "kernel-rt_debug-5.3.18-62.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-62.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-62.3.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-62.3.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-62.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-62.3.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-62.3.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-62.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-62.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-62.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-62.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-62.2.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-62.2.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-62.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-62.3.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-62.3.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-62.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-62.2.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-62.2.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-62.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-62.3.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-62.3.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-62.3.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-62.2.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-62.2.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-62.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-62.3.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-62.3.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-62.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Real Time Module 15 SP2",
"product": {
"name": "SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-rt:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-rt-5.3.18-62.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64"
},
"product_reference": "cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-rt-5.3.18-62.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64"
},
"product_reference": "dlm-kmp-rt-5.3.18-62.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-rt-5.3.18-62.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64"
},
"product_reference": "gfs2-kmp-rt-5.3.18-62.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-rt-5.3.18-62.3.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch"
},
"product_reference": "kernel-devel-rt-5.3.18-62.3.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-62.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64"
},
"product_reference": "kernel-rt-5.3.18-62.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-5.3.18-62.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64"
},
"product_reference": "kernel-rt-devel-5.3.18-62.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-5.3.18-62.3.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64"
},
"product_reference": "kernel-rt_debug-5.3.18-62.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt_debug-devel-5.3.18-62.3.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64"
},
"product_reference": "kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-62.3.noarch as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-62.3.noarch",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-rt-5.3.18-62.1.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64"
},
"product_reference": "kernel-syms-rt-5.3.18-62.1.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-rt-5.3.18-62.2.x86_64 as component of SUSE Real Time Module 15 SP2",
"product_id": "SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
},
"product_reference": "ocfs2-kmp-rt-5.3.18-62.2.x86_64",
"relates_to_product_reference": "SUSE Real Time Module 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-62.2.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64"
},
"product_reference": "kernel-rt-5.3.18-62.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-27820",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-27820"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-27820",
"url": "https://www.suse.com/security/cve/CVE-2020-27820"
},
{
"category": "external",
"summary": "SUSE Bug 1179599 for CVE-2020-27820",
"url": "https://bugzilla.suse.com/1179599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-09T10:12:22Z",
"details": "low"
}
],
"title": "CVE-2020-27820"
},
{
"cve": "CVE-2021-0941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0941"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0941",
"url": "https://www.suse.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "SUSE Bug 1192045 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "external",
"summary": "SUSE Bug 1192048 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-09T10:12:22Z",
"details": "important"
}
],
"title": "CVE-2021-0941"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-09T10:12:22Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-09T10:12:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-09T10:12:22Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-09T10:12:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:cluster-md-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:dlm-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:gfs2-kmp-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-devel-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-rt-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt-devel-5.3.18-62.2.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-rt_debug-devel-5.3.18-62.3.x86_64",
"SUSE Real Time Module 15 SP2:kernel-source-rt-5.3.18-62.3.noarch",
"SUSE Real Time Module 15 SP2:kernel-syms-rt-5.3.18-62.1.x86_64",
"SUSE Real Time Module 15 SP2:ocfs2-kmp-rt-5.3.18-62.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-09T10:12:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
suse-su-2022:2111-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 SP1 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)\n- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)\n- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)\n- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2021-39711: In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1197219).\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).\n- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).\n- CVE-2019-20811: Fixed issue in rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, where a reference count is mishandled (bnc#1172456).\n- CVE-2022-28748: Fixed memory lead over the network by ax88179_178a devices (bsc#1196018).\n- CVE-2018-7755: Fixed an issue in the fd_locked_ioctl function in drivers/block/floppy.c. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR (bnc#1084513).\n- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).\n- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).\n- CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).\n- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c (bnc#1198516).\n- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).\n- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)\n- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144).\n- CVE-2020-26541: Enforce the secure boot forbidden signature database (aka dbx) protection mechanism. (bnc#1177282)\n- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)\n- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it\u0027s been trivial to break out of it with kgdb or kdb. (bsc#1199426)\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605).\n\nThe following non-security bugs were fixed:\n\n- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bsc#1199399).\n- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).\n- net: ena: A typo fix in the file ena_com.h (bsc#1198777).\n- net: ena: Add capabilities field with support for ENI stats capability (bsc#1198777).\n- net: ena: Add debug prints for invalid req_id resets (bsc#1198777).\n- net: ena: add device distinct log prefix to files (bsc#1198777).\n- net: ena: add jiffies of last napi call to stats (bsc#1198777).\n- net: ena: aggregate doorbell common operations into a function (bsc#1198777).\n- net: ena: aggregate stats increase into a function (bsc#1198777).\n- net: ena: Change ENI stats support check to use capabilities field (bsc#1198777).\n- net: ena: Change return value of ena_calc_io_queue_size() to void (bsc#1198777).\n- net: ena: Change the name of bad_csum variable (bsc#1198777).\n- net: ena: Extract recurring driver reset code into a function (bsc#1198777).\n- net: ena: fix coding style nits (bsc#1198777).\n- net: ena: fix DMA mapping function issues in XDP (bsc#1198777).\n- net: ena: Fix error handling when calculating max IO queues number (bsc#1198777).\n- net: ena: fix inaccurate print type (bsc#1198777).\n- net: ena: Fix undefined state when tx request id is out of bounds (bsc#1198777).\n- net: ena: Fix wrong rx request id by resetting device (bsc#1198777).\n- net: ena: Improve error logging in driver (bsc#1198777).\n- net: ena: introduce ndo_xdp_xmit() function for XDP_REDIRECT (bsc#1198777).\n- net: ena: introduce XDP redirect implementation (bsc#1198777).\n- net: ena: make symbol \u0027ena_alloc_map_page\u0027 static (bsc#1198777).\n- net: ena: Move reset completion print to the reset function (bsc#1198777).\n- net: ena: optimize data access in fast-path code (bsc#1198777).\n- net: ena: re-organize code to improve readability (bsc#1198777).\n- net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1198777).\n- net: ena: remove extra words from comments (bsc#1198777).\n- net: ena: Remove module param and change message severity (bsc#1198777).\n- net: ena: Remove rcu_read_lock() around XDP program invocation (bsc#1198777).\n- net: ena: Remove redundant return code check (bsc#1198777).\n- net: ena: Remove unused code (bsc#1198777).\n- net: ena: store values in their appropriate variables types (bsc#1198777).\n- net: ena: Update XDP verdict upon failure (bsc#1198777).\n- net: ena: use build_skb() in RX path (bsc#1198777).\n- net: ena: use constant value for net_device allocation (bsc#1198777).\n- net: ena: Use dev_alloc() in RX buffer allocation (bsc#1198777).\n- net: ena: Use pci_sriov_configure_simple() to enable VFs (bsc#1198777).\n- net: ena: use xdp_frame in XDP TX flow (bsc#1198777).\n- net: ena: use xdp_return_frame() to free xdp frames (bsc#1198777).\n- net: mana: Add counter for packet dropped by XDP (bsc#1195651).\n- net: mana: Add counter for XDP_TX (bsc#1195651).\n- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).\n- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).\n- net: mana: Reuse XDP dropped page (bsc#1195651).\n- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).\n- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).\n- powerpc/64: Fix kernel stack 16-byte alignment (bsc#1196999 ltc#196609S git-fixes).\n- powerpc/64: Interrupts save PPR on stack rather than thread_struct (bsc#1196999 ltc#196609).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).\n- scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825).\n- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).\n- x86/pm: Save the MSR validity status at context setup (bsc#1114648).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1114648).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2111,SUSE-SLE-Module-Live-Patching-15-SP1-2022-2111,SUSE-SLE-Product-HA-15-SP1-2022-2111,SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-2111,SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-2111,SUSE-SLE-Product-SLES-15-SP1-BCL-2022-2111,SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-2111,SUSE-SLE-Product-SLES_SAP-15-SP1-2022-2111,SUSE-Storage-6-2022-2111,openSUSE-SLE-15.3-2022-2111,openSUSE-SLE-15.4-2022-2111",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2111-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2111-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222111-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2111-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html"
},
{
"category": "self",
"summary": "SUSE Bug 1028340",
"url": "https://bugzilla.suse.com/1028340"
},
{
"category": "self",
"summary": "SUSE Bug 1055710",
"url": "https://bugzilla.suse.com/1055710"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1084513",
"url": "https://bugzilla.suse.com/1084513"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1114648",
"url": "https://bugzilla.suse.com/1114648"
},
{
"category": "self",
"summary": "SUSE Bug 1158266",
"url": "https://bugzilla.suse.com/1158266"
},
{
"category": "self",
"summary": "SUSE Bug 1172456",
"url": "https://bugzilla.suse.com/1172456"
},
{
"category": "self",
"summary": "SUSE Bug 1177282",
"url": "https://bugzilla.suse.com/1177282"
},
{
"category": "self",
"summary": "SUSE Bug 1182171",
"url": "https://bugzilla.suse.com/1182171"
},
{
"category": "self",
"summary": "SUSE Bug 1183723",
"url": "https://bugzilla.suse.com/1183723"
},
{
"category": "self",
"summary": "SUSE Bug 1187055",
"url": "https://bugzilla.suse.com/1187055"
},
{
"category": "self",
"summary": "SUSE Bug 1191647",
"url": "https://bugzilla.suse.com/1191647"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1195065",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "self",
"summary": "SUSE Bug 1195651",
"url": "https://bugzilla.suse.com/1195651"
},
{
"category": "self",
"summary": "SUSE Bug 1196018",
"url": "https://bugzilla.suse.com/1196018"
},
{
"category": "self",
"summary": "SUSE Bug 1196367",
"url": "https://bugzilla.suse.com/1196367"
},
{
"category": "self",
"summary": "SUSE Bug 1196426",
"url": "https://bugzilla.suse.com/1196426"
},
{
"category": "self",
"summary": "SUSE Bug 1196999",
"url": "https://bugzilla.suse.com/1196999"
},
{
"category": "self",
"summary": "SUSE Bug 1197219",
"url": "https://bugzilla.suse.com/1197219"
},
{
"category": "self",
"summary": "SUSE Bug 1197343",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "self",
"summary": "SUSE Bug 1197663",
"url": "https://bugzilla.suse.com/1197663"
},
{
"category": "self",
"summary": "SUSE Bug 1198400",
"url": "https://bugzilla.suse.com/1198400"
},
{
"category": "self",
"summary": "SUSE Bug 1198516",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "self",
"summary": "SUSE Bug 1198577",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "self",
"summary": "SUSE Bug 1198660",
"url": "https://bugzilla.suse.com/1198660"
},
{
"category": "self",
"summary": "SUSE Bug 1198687",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "self",
"summary": "SUSE Bug 1198742",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "self",
"summary": "SUSE Bug 1198777",
"url": "https://bugzilla.suse.com/1198777"
},
{
"category": "self",
"summary": "SUSE Bug 1198825",
"url": "https://bugzilla.suse.com/1198825"
},
{
"category": "self",
"summary": "SUSE Bug 1199012",
"url": "https://bugzilla.suse.com/1199012"
},
{
"category": "self",
"summary": "SUSE Bug 1199063",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "self",
"summary": "SUSE Bug 1199314",
"url": "https://bugzilla.suse.com/1199314"
},
{
"category": "self",
"summary": "SUSE Bug 1199399",
"url": "https://bugzilla.suse.com/1199399"
},
{
"category": "self",
"summary": "SUSE Bug 1199426",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "self",
"summary": "SUSE Bug 1199505",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "self",
"summary": "SUSE Bug 1199507",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "self",
"summary": "SUSE Bug 1199605",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "self",
"summary": "SUSE Bug 1199650",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "self",
"summary": "SUSE Bug 1200143",
"url": "https://bugzilla.suse.com/1200143"
},
{
"category": "self",
"summary": "SUSE Bug 1200144",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "self",
"summary": "SUSE Bug 1200249",
"url": "https://bugzilla.suse.com/1200249"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13695 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-7755 page",
"url": "https://www.suse.com/security/cve/CVE-2018-7755/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19377 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-26541 page",
"url": "https://www.suse.com/security/cve/CVE-2020-26541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20292 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20321 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33061 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38208 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39711 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1011 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1184 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1353 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1419 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1516 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1652 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1652/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1729 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1734 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1974 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1975 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21123 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21125 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21127 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21166 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21180 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21499 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22942 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-28748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-28748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-30594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-30594/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-06-17T07:22:23Z",
"generator": {
"date": "2022-06-17T07:22:23Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2111-1",
"initial_release_date": "2022-06-17T07:22:23Z",
"revision_history": [
{
"date": "2022-06-17T07:22:23Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-default-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-default-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-default-base-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-default-extra-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-syms-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-vanilla-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150100.197.114.2.noarch",
"product": {
"name": "kernel-devel-4.12.14-150100.197.114.2.noarch",
"product_id": "kernel-devel-4.12.14-150100.197.114.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150100.197.114.2.noarch",
"product": {
"name": "kernel-docs-4.12.14-150100.197.114.2.noarch",
"product_id": "kernel-docs-4.12.14-150100.197.114.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150100.197.114.2.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150100.197.114.2.noarch",
"product_id": "kernel-docs-html-4.12.14-150100.197.114.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150100.197.114.2.noarch",
"product": {
"name": "kernel-macros-4.12.14-150100.197.114.2.noarch",
"product_id": "kernel-macros-4.12.14-150100.197.114.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150100.197.114.2.noarch",
"product": {
"name": "kernel-source-4.12.14-150100.197.114.2.noarch",
"product_id": "kernel-source-4.12.14-150100.197.114.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150100.197.114.2.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150100.197.114.2.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150100.197.114.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-debug-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-default-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-default-base-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-syms-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"product_id": "dlm-kmp-default-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-default-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-default-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-default-base-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-default-devel-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-default-extra-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-default-man-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-obs-build-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-obs-qa-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-syms-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-syms-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-vanilla-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.114.2.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-debug-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-debug-base-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-default-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-default-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-default-base-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-default-extra-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-syms-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-vanilla-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_bcl:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp1"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 6",
"product": {
"name": "SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15 SP1",
"product_id": "SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15 SP1",
"product_id": "SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-BCL",
"product_id": "SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP1-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP1-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.114.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP1",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150100.197.114.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150100.197.114.2.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150100.197.114.2.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150100.197.114.2.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150100.197.114.2.noarch as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch"
},
"product_reference": "kernel-source-4.12.14-150100.197.114.2.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150100.197.114.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64 as component of SUSE Enterprise Storage 6",
"product_id": "SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.114.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.114.2.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-base-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64"
},
"product_reference": "kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
},
"product_reference": "kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13695"
}
],
"notes": [
{
"category": "general",
"text": "The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13695",
"url": "https://www.suse.com/security/cve/CVE-2017-13695"
},
{
"category": "external",
"summary": "SUSE Bug 1055710 for CVE-2017-13695",
"url": "https://bugzilla.suse.com/1055710"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-13695",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "low"
}
],
"title": "CVE-2017-13695"
},
{
"cve": "CVE-2018-7755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-7755"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-7755",
"url": "https://www.suse.com/security/cve/CVE-2018-7755"
},
{
"category": "external",
"summary": "SUSE Bug 1084513 for CVE-2018-7755",
"url": "https://bugzilla.suse.com/1084513"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "low"
}
],
"title": "CVE-2018-7755"
},
{
"cve": "CVE-2019-19377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19377"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19377",
"url": "https://www.suse.com/security/cve/CVE-2019-19377"
},
{
"category": "external",
"summary": "SUSE Bug 1158266 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1158266"
},
{
"category": "external",
"summary": "SUSE Bug 1162338 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1162338"
},
{
"category": "external",
"summary": "SUSE Bug 1162369 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1162369"
},
{
"category": "external",
"summary": "SUSE Bug 1173871 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1173871"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "important"
}
],
"title": "CVE-2019-19377"
},
{
"cve": "CVE-2019-20811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20811"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20811",
"url": "https://www.suse.com/security/cve/CVE-2019-20811"
},
{
"category": "external",
"summary": "SUSE Bug 1172456 for CVE-2019-20811",
"url": "https://bugzilla.suse.com/1172456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2019-20811"
},
{
"cve": "CVE-2020-26541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-26541"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel through 5.8.13 does not properly enforce the Secure Boot Forbidden Signature Database (aka dbx) protection mechanism. This affects certs/blacklist.c and certs/system_keyring.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-26541",
"url": "https://www.suse.com/security/cve/CVE-2020-26541"
},
{
"category": "external",
"summary": "SUSE Bug 1177282 for CVE-2020-26541",
"url": "https://bugzilla.suse.com/1177282"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2021-20292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20292"
}
],
"notes": [
{
"category": "general",
"text": "There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20292",
"url": "https://www.suse.com/security/cve/CVE-2021-20292"
},
{
"category": "external",
"summary": "SUSE Bug 1183723 for CVE-2021-20292",
"url": "https://bugzilla.suse.com/1183723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-20292"
},
{
"cve": "CVE-2021-20321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20321"
}
],
"notes": [
{
"category": "general",
"text": "A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20321",
"url": "https://www.suse.com/security/cve/CVE-2021-20321"
},
{
"category": "external",
"summary": "SUSE Bug 1191647 for CVE-2021-20321",
"url": "https://bugzilla.suse.com/1191647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-20321"
},
{
"cve": "CVE-2021-33061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33061"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33061",
"url": "https://www.suse.com/security/cve/CVE-2021-33061"
},
{
"category": "external",
"summary": "SUSE Bug 1196426 for CVE-2021-33061",
"url": "https://bugzilla.suse.com/1196426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-33061"
},
{
"cve": "CVE-2021-38208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38208"
}
],
"notes": [
{
"category": "general",
"text": "net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38208",
"url": "https://www.suse.com/security/cve/CVE-2021-38208"
},
{
"category": "external",
"summary": "SUSE Bug 1187055 for CVE-2021-38208",
"url": "https://bugzilla.suse.com/1187055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-38208"
},
{
"cve": "CVE-2021-39711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39711"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39711",
"url": "https://www.suse.com/security/cve/CVE-2021-39711"
},
{
"category": "external",
"summary": "SUSE Bug 1197219 for CVE-2021-39711",
"url": "https://bugzilla.suse.com/1197219"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-39711"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2022-1011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1011"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1011",
"url": "https://www.suse.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "SUSE Bug 1197343 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "external",
"summary": "SUSE Bug 1197344 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197344"
},
{
"category": "external",
"summary": "SUSE Bug 1198687 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212322 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1212322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-1184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1184"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1184",
"url": "https://www.suse.com/security/cve/CVE-2022-1184"
},
{
"category": "external",
"summary": "SUSE Bug 1198577 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "external",
"summary": "SUSE Bug 1210859 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1210859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1353"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1353",
"url": "https://www.suse.com/security/cve/CVE-2022-1353"
},
{
"category": "external",
"summary": "SUSE Bug 1198516 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "external",
"summary": "SUSE Bug 1212293 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1212293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1419"
}
],
"notes": [
{
"category": "general",
"text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1419",
"url": "https://www.suse.com/security/cve/CVE-2022-1419"
},
{
"category": "external",
"summary": "SUSE Bug 1198742 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "external",
"summary": "SUSE Bug 1201655 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1201655"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-1419"
},
{
"cve": "CVE-2022-1516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1516"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1516",
"url": "https://www.suse.com/security/cve/CVE-2022-1516"
},
{
"category": "external",
"summary": "SUSE Bug 1199012 for CVE-2022-1516",
"url": "https://bugzilla.suse.com/1199012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-1652",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1652"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1652",
"url": "https://www.suse.com/security/cve/CVE-2022-1652"
},
{
"category": "external",
"summary": "SUSE Bug 1199063 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "external",
"summary": "SUSE Bug 1200057 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200057"
},
{
"category": "external",
"summary": "SUSE Bug 1200751 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200751"
},
{
"category": "external",
"summary": "SUSE Bug 1201034 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201034"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212307 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1212307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-1652"
},
{
"cve": "CVE-2022-1729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1729"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1729",
"url": "https://www.suse.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "SUSE Bug 1199507 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "external",
"summary": "SUSE Bug 1199697 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199697"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "important"
}
],
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1734",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1734"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1734",
"url": "https://www.suse.com/security/cve/CVE-2022-1734"
},
{
"category": "external",
"summary": "SUSE Bug 1199605 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "external",
"summary": "SUSE Bug 1199606 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199606"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "important"
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-1974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1974"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1974",
"url": "https://www.suse.com/security/cve/CVE-2022-1974"
},
{
"category": "external",
"summary": "SUSE Bug 1200144 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "external",
"summary": "SUSE Bug 1200265 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1975"
}
],
"notes": [
{
"category": "general",
"text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1975",
"url": "https://www.suse.com/security/cve/CVE-2022-1975"
},
{
"category": "external",
"summary": "SUSE Bug 1200143 for CVE-2022-1975",
"url": "https://bugzilla.suse.com/1200143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-21123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21123"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21123",
"url": "https://www.suse.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209075 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1209075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21125"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21125",
"url": "https://www.suse.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209074 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1209074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21127"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21127",
"url": "https://www.suse.com/security/cve/CVE-2022-21127"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1200549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-21127"
},
{
"cve": "CVE-2022-21166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21166"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21166",
"url": "https://www.suse.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209073 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1209073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21180"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21180",
"url": "https://www.suse.com/security/cve/CVE-2022-21180"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1212313 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1212313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-21180"
},
{
"cve": "CVE-2022-21499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21499"
}
],
"notes": [
{
"category": "general",
"text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21499",
"url": "https://www.suse.com/security/cve/CVE-2022-21499"
},
{
"category": "external",
"summary": "SUSE Bug 1199426 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "external",
"summary": "SUSE Bug 1200059 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1200059"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1203034"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212315 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1212315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "important"
}
],
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-22942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22942"
}
],
"notes": [
{
"category": "general",
"text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22942",
"url": "https://www.suse.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "SUSE Bug 1195065 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "external",
"summary": "SUSE Bug 1195951 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "moderate"
}
],
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-28748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-28748"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-2964. Reason: This candidate is a reservation duplicate of CVE-2022-2964. Notes: All CVE users should reference CVE-2022-2964 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-28748",
"url": "https://www.suse.com/security/cve/CVE-2022-28748"
},
{
"category": "external",
"summary": "SUSE Bug 1196018 for CVE-2022-28748",
"url": "https://bugzilla.suse.com/1196018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "low"
}
],
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-30594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-30594"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-30594",
"url": "https://www.suse.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "SUSE Bug 1199505 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "external",
"summary": "SUSE Bug 1199602 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199602"
},
{
"category": "external",
"summary": "SUSE Bug 1201549 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1201549"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1204132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Enterprise Storage 6:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:cluster-md-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:dlm-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:gfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15 SP1:ocfs2-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-default-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15 SP1:kernel-livepatch-4_12_14-150100_197_114-default-1-150100.3.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-BCL:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-BCL:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.aarch64",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.s390x",
"SUSE Linux Enterprise Server 15 SP1-LTSS:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-base-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-default-devel-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-devel-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-docs-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-macros-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-obs-build-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-source-4.12.14-150100.197.114.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:kernel-syms-4.12.14-150100.197.114.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP1:reiserfs-kmp-default-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.3:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-debug-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-default-man-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-kvmsmall-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-base-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.aarch64",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.ppc64le",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.s390x",
"openSUSE Leap 15.4:kernel-vanilla-livepatch-devel-4.12.14-150100.197.114.2.x86_64",
"openSUSE Leap 15.4:kernel-zfcpdump-man-4.12.14-150100.197.114.2.s390x"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-17T07:22:23Z",
"details": "important"
}
],
"title": "CVE-2022-30594"
}
]
}
suse-su-2024:2384-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n The SUSE Linux Enterprise 15 SP3 RT kernel was updated to receive various security bugfixes.\n\n\n The following security bugs were fixed:\n\n - CVE-2021-47247: net/mlx5e: Fix use-after-free of encap entry in neigh update handler (bsc#1224865).\n - CVE-2021-47311: net: qcom/emac: fix UAF in emac_remove (bsc#1225010).\n - CVE-2021-47368: enetc: Fix illegal access when reading affinity_hint (bsc#1225161).\n - CVE-2021-47372: net: macb: fix use after free on rmmod (bsc#1225184).\n - CVE-2021-47379: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd (bsc#1225203).\n - CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).\n - CVE-2022-2938: psi: Fix uaf issue when psi trigger is destroyed while being polled (bsc#1202623).\n - CVE-2022-48760: USB: core: Fix hang in usb_kill_urb by adding memory barriers (bsc#1226712).\n - CVE-2023-52707: sched/psi: Fix use-after-free in ep_remove_wait_queue() (bsc#1225109). polled (bsc#1202623).\n - CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).\n - CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).\n - CVE-2024-26822: Set correct id, uid and cruid for multiuser automounts (bsc#1223011).\n - CVE-2024-35789: Check fast rx for non-4addr sta VLAN changes (bsc#1224749).\n - CVE-2024-35861: Fixed potential UAF in cifs_signal_cifsd_for_reconnect() (bsc#1224766).\n - CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).\n - CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).\n - CVE-2024-35950: drm/client: Fully protect modes with dev-\u003emode_config.mutex (bsc#1224703).\n - CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).\n - CVE-2024-36904: tcp: Use refcount_inc_not_zero() in tcp_twsk_unique() (bsc#1225732).\n - CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).\n - CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).\n - CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).\n - CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).\n - CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).\n\n The following non-security bugs were fixed:\n\n - NFS: avoid infinite loop in pnfs_update_layout (bsc#1219633 bsc#1226226).\n - ocfs2: adjust enabling place for la window (bsc#1219224).\n - ocfs2: fix sparse warnings (bsc#1219224).\n - ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).\n - ocfs2: speed up chain-list searching (bsc#1219224).\n - psi: Fix uaf issue when psi trigger is destroyed while being\n - x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2384,SUSE-SUSE-MicroOS-5.1-2024-2384,SUSE-SUSE-MicroOS-5.2-2024-2384",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2384-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2384-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242384-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2384-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035906.html"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1171988",
"url": "https://bugzilla.suse.com/1171988"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1181147",
"url": "https://bugzilla.suse.com/1181147"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1195065",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "self",
"summary": "SUSE Bug 1195254",
"url": "https://bugzilla.suse.com/1195254"
},
{
"category": "self",
"summary": "SUSE Bug 1195798",
"url": "https://bugzilla.suse.com/1195798"
},
{
"category": "self",
"summary": "SUSE Bug 1202623",
"url": "https://bugzilla.suse.com/1202623"
},
{
"category": "self",
"summary": "SUSE Bug 1218148",
"url": "https://bugzilla.suse.com/1218148"
},
{
"category": "self",
"summary": "SUSE Bug 1219224",
"url": "https://bugzilla.suse.com/1219224"
},
{
"category": "self",
"summary": "SUSE Bug 1219633",
"url": "https://bugzilla.suse.com/1219633"
},
{
"category": "self",
"summary": "SUSE Bug 1222015",
"url": "https://bugzilla.suse.com/1222015"
},
{
"category": "self",
"summary": "SUSE Bug 1223011",
"url": "https://bugzilla.suse.com/1223011"
},
{
"category": "self",
"summary": "SUSE Bug 1224671",
"url": "https://bugzilla.suse.com/1224671"
},
{
"category": "self",
"summary": "SUSE Bug 1224703",
"url": "https://bugzilla.suse.com/1224703"
},
{
"category": "self",
"summary": "SUSE Bug 1224749",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "self",
"summary": "SUSE Bug 1224764",
"url": "https://bugzilla.suse.com/1224764"
},
{
"category": "self",
"summary": "SUSE Bug 1224765",
"url": "https://bugzilla.suse.com/1224765"
},
{
"category": "self",
"summary": "SUSE Bug 1224766",
"url": "https://bugzilla.suse.com/1224766"
},
{
"category": "self",
"summary": "SUSE Bug 1224865",
"url": "https://bugzilla.suse.com/1224865"
},
{
"category": "self",
"summary": "SUSE Bug 1225010",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "self",
"summary": "SUSE Bug 1225047",
"url": "https://bugzilla.suse.com/1225047"
},
{
"category": "self",
"summary": "SUSE Bug 1225109",
"url": "https://bugzilla.suse.com/1225109"
},
{
"category": "self",
"summary": "SUSE Bug 1225161",
"url": "https://bugzilla.suse.com/1225161"
},
{
"category": "self",
"summary": "SUSE Bug 1225184",
"url": "https://bugzilla.suse.com/1225184"
},
{
"category": "self",
"summary": "SUSE Bug 1225203",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "self",
"summary": "SUSE Bug 1225487",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "self",
"summary": "SUSE Bug 1225518",
"url": "https://bugzilla.suse.com/1225518"
},
{
"category": "self",
"summary": "SUSE Bug 1225611",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "self",
"summary": "SUSE Bug 1225732",
"url": "https://bugzilla.suse.com/1225732"
},
{
"category": "self",
"summary": "SUSE Bug 1225749",
"url": "https://bugzilla.suse.com/1225749"
},
{
"category": "self",
"summary": "SUSE Bug 1225840",
"url": "https://bugzilla.suse.com/1225840"
},
{
"category": "self",
"summary": "SUSE Bug 1225866",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "self",
"summary": "SUSE Bug 1226226",
"url": "https://bugzilla.suse.com/1226226"
},
{
"category": "self",
"summary": "SUSE Bug 1226537",
"url": "https://bugzilla.suse.com/1226537"
},
{
"category": "self",
"summary": "SUSE Bug 1226552",
"url": "https://bugzilla.suse.com/1226552"
},
{
"category": "self",
"summary": "SUSE Bug 1226554",
"url": "https://bugzilla.suse.com/1226554"
},
{
"category": "self",
"summary": "SUSE Bug 1226557",
"url": "https://bugzilla.suse.com/1226557"
},
{
"category": "self",
"summary": "SUSE Bug 1226558",
"url": "https://bugzilla.suse.com/1226558"
},
{
"category": "self",
"summary": "SUSE Bug 1226562",
"url": "https://bugzilla.suse.com/1226562"
},
{
"category": "self",
"summary": "SUSE Bug 1226563",
"url": "https://bugzilla.suse.com/1226563"
},
{
"category": "self",
"summary": "SUSE Bug 1226575",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "self",
"summary": "SUSE Bug 1226583",
"url": "https://bugzilla.suse.com/1226583"
},
{
"category": "self",
"summary": "SUSE Bug 1226585",
"url": "https://bugzilla.suse.com/1226585"
},
{
"category": "self",
"summary": "SUSE Bug 1226587",
"url": "https://bugzilla.suse.com/1226587"
},
{
"category": "self",
"summary": "SUSE Bug 1226595",
"url": "https://bugzilla.suse.com/1226595"
},
{
"category": "self",
"summary": "SUSE Bug 1226614",
"url": "https://bugzilla.suse.com/1226614"
},
{
"category": "self",
"summary": "SUSE Bug 1226619",
"url": "https://bugzilla.suse.com/1226619"
},
{
"category": "self",
"summary": "SUSE Bug 1226621",
"url": "https://bugzilla.suse.com/1226621"
},
{
"category": "self",
"summary": "SUSE Bug 1226624",
"url": "https://bugzilla.suse.com/1226624"
},
{
"category": "self",
"summary": "SUSE Bug 1226643",
"url": "https://bugzilla.suse.com/1226643"
},
{
"category": "self",
"summary": "SUSE Bug 1226644",
"url": "https://bugzilla.suse.com/1226644"
},
{
"category": "self",
"summary": "SUSE Bug 1226645",
"url": "https://bugzilla.suse.com/1226645"
},
{
"category": "self",
"summary": "SUSE Bug 1226647",
"url": "https://bugzilla.suse.com/1226647"
},
{
"category": "self",
"summary": "SUSE Bug 1226650",
"url": "https://bugzilla.suse.com/1226650"
},
{
"category": "self",
"summary": "SUSE Bug 1226669",
"url": "https://bugzilla.suse.com/1226669"
},
{
"category": "self",
"summary": "SUSE Bug 1226670",
"url": "https://bugzilla.suse.com/1226670"
},
{
"category": "self",
"summary": "SUSE Bug 1226672",
"url": "https://bugzilla.suse.com/1226672"
},
{
"category": "self",
"summary": "SUSE Bug 1226674",
"url": "https://bugzilla.suse.com/1226674"
},
{
"category": "self",
"summary": "SUSE Bug 1226679",
"url": "https://bugzilla.suse.com/1226679"
},
{
"category": "self",
"summary": "SUSE Bug 1226686",
"url": "https://bugzilla.suse.com/1226686"
},
{
"category": "self",
"summary": "SUSE Bug 1226691",
"url": "https://bugzilla.suse.com/1226691"
},
{
"category": "self",
"summary": "SUSE Bug 1226692",
"url": "https://bugzilla.suse.com/1226692"
},
{
"category": "self",
"summary": "SUSE Bug 1226698",
"url": "https://bugzilla.suse.com/1226698"
},
{
"category": "self",
"summary": "SUSE Bug 1226703",
"url": "https://bugzilla.suse.com/1226703"
},
{
"category": "self",
"summary": "SUSE Bug 1226708",
"url": "https://bugzilla.suse.com/1226708"
},
{
"category": "self",
"summary": "SUSE Bug 1226709",
"url": "https://bugzilla.suse.com/1226709"
},
{
"category": "self",
"summary": "SUSE Bug 1226711",
"url": "https://bugzilla.suse.com/1226711"
},
{
"category": "self",
"summary": "SUSE Bug 1226712",
"url": "https://bugzilla.suse.com/1226712"
},
{
"category": "self",
"summary": "SUSE Bug 1226713",
"url": "https://bugzilla.suse.com/1226713"
},
{
"category": "self",
"summary": "SUSE Bug 1226715",
"url": "https://bugzilla.suse.com/1226715"
},
{
"category": "self",
"summary": "SUSE Bug 1226716",
"url": "https://bugzilla.suse.com/1226716"
},
{
"category": "self",
"summary": "SUSE Bug 1226720",
"url": "https://bugzilla.suse.com/1226720"
},
{
"category": "self",
"summary": "SUSE Bug 1226721",
"url": "https://bugzilla.suse.com/1226721"
},
{
"category": "self",
"summary": "SUSE Bug 1226732",
"url": "https://bugzilla.suse.com/1226732"
},
{
"category": "self",
"summary": "SUSE Bug 1226762",
"url": "https://bugzilla.suse.com/1226762"
},
{
"category": "self",
"summary": "SUSE Bug 1226785",
"url": "https://bugzilla.suse.com/1226785"
},
{
"category": "self",
"summary": "SUSE Bug 1226786",
"url": "https://bugzilla.suse.com/1226786"
},
{
"category": "self",
"summary": "SUSE Bug 1226962",
"url": "https://bugzilla.suse.com/1226962"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4439 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47247 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47247/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47311 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47328 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47368 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47368/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47372 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47571 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47583 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47583/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47589 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47595 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47595/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47596 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47600 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47602 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47611 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47617 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47618 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47619 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47620 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2938 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48711 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48715 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48717 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48724 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48726 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48726/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48728 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48730 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48732 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48736 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48737 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48738 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48746 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48747 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48749 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48752 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48754 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48756 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48758 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48759 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48760 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48767 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48768 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48771 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-24023 page",
"url": "https://www.suse.com/security/cve/CVE-2023-24023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52707 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52707/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52752 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52881 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26822 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35789 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35861 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35861/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35862 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35864 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35878 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35878/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35950 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36894 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36894/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36904 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36904/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36940 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36964 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38541 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38559 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38559/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38560 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38560/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-07-10T12:03:43Z",
"generator": {
"date": "2024-07-10T12:03:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2384-1",
"initial_release_date": "2024-07-10T12:03:43Z",
"revision_history": [
{
"date": "2024-07-10T12:03:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-rt-5.3.18-150300.175.1.noarch",
"product": {
"name": "kernel-devel-rt-5.3.18-150300.175.1.noarch",
"product_id": "kernel-devel-rt-5.3.18-150300.175.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-rt-5.3.18-150300.175.1.noarch",
"product": {
"name": "kernel-source-rt-5.3.18-150300.175.1.noarch",
"product_id": "kernel-source-rt-5.3.18-150300.175.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-rt-5.3.18-150300.175.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt-5.3.18-150300.175.1.x86_64",
"product_id": "cluster-md-kmp-rt-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product": {
"name": "cluster-md-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product_id": "cluster-md-kmp-rt_debug-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt-5.3.18-150300.175.1.x86_64",
"product": {
"name": "dlm-kmp-rt-5.3.18-150300.175.1.x86_64",
"product_id": "dlm-kmp-rt-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product": {
"name": "dlm-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product_id": "dlm-kmp-rt_debug-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt-5.3.18-150300.175.1.x86_64",
"product": {
"name": "gfs2-kmp-rt-5.3.18-150300.175.1.x86_64",
"product_id": "gfs2-kmp-rt-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product": {
"name": "gfs2-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product_id": "gfs2-kmp-rt_debug-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-rt-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-rt-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-rt-devel-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-rt-devel-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-extra-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-rt-extra-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-rt-extra-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-livepatch-devel-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-rt-livepatch-devel-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-rt-livepatch-devel-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt-optional-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-rt-optional-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-rt-optional-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-rt_debug-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-rt_debug-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-devel-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-rt_debug-devel-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-rt_debug-devel-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-extra-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-rt_debug-extra-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-rt_debug-extra-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-rt_debug-livepatch-devel-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-rt_debug-livepatch-devel-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-rt_debug-optional-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-rt_debug-optional-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-rt_debug-optional-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-rt-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kernel-syms-rt-5.3.18-150300.175.1.x86_64",
"product_id": "kernel-syms-rt-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kselftests-kmp-rt-5.3.18-150300.175.1.x86_64",
"product_id": "kselftests-kmp-rt-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product": {
"name": "kselftests-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product_id": "kselftests-kmp-rt_debug-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt-5.3.18-150300.175.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt-5.3.18-150300.175.1.x86_64",
"product_id": "ocfs2-kmp-rt-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product": {
"name": "ocfs2-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product_id": "ocfs2-kmp-rt_debug-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt-5.3.18-150300.175.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt-5.3.18-150300.175.1.x86_64",
"product_id": "reiserfs-kmp-rt-5.3.18-150300.175.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product": {
"name": "reiserfs-kmp-rt_debug-5.3.18-150300.175.1.x86_64",
"product_id": "reiserfs-kmp-rt_debug-5.3.18-150300.175.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.175.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.175.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-150300.175.1.noarch as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-150300.175.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-5.3.18-150300.175.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64"
},
"product_reference": "kernel-rt-5.3.18-150300.175.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-rt-5.3.18-150300.175.1.noarch as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
},
"product_reference": "kernel-source-rt-5.3.18-150300.175.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2021-4439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: cpai: check ctr-\u003ecnr to avoid array index out of bound\n\nThe cmtp_add_connection() would add a cmtp session to a controller\nand run a kernel thread to process cmtp.\n\n\t__module_get(THIS_MODULE);\n\tsession-\u003etask = kthread_run(cmtp_session, session, \"kcmtpd_ctr_%d\",\n\t\t\t\t\t\t\t\tsession-\u003enum);\n\nDuring this process, the kernel thread would call detach_capi_ctr()\nto detach a register controller. if the controller\nwas not attached yet, detach_capi_ctr() would\ntrigger an array-index-out-bounds bug.\n\n[ 46.866069][ T6479] UBSAN: array-index-out-of-bounds in\ndrivers/isdn/capi/kcapi.c:483:21\n[ 46.867196][ T6479] index -1 is out of range for type \u0027capi_ctr *[32]\u0027\n[ 46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 Not tainted\n5.15.0-rc2+ #8\n[ 46.869002][ T6479] Hardware name: QEMU Standard PC (i440FX + PIIX,\n1996), BIOS 1.14.0-2 04/01/2014\n[ 46.870107][ T6479] Call Trace:\n[ 46.870473][ T6479] dump_stack_lvl+0x57/0x7d\n[ 46.870974][ T6479] ubsan_epilogue+0x5/0x40\n[ 46.871458][ T6479] __ubsan_handle_out_of_bounds.cold+0x43/0x48\n[ 46.872135][ T6479] detach_capi_ctr+0x64/0xc0\n[ 46.872639][ T6479] cmtp_session+0x5c8/0x5d0\n[ 46.873131][ T6479] ? __init_waitqueue_head+0x60/0x60\n[ 46.873712][ T6479] ? cmtp_add_msgpart+0x120/0x120\n[ 46.874256][ T6479] kthread+0x147/0x170\n[ 46.874709][ T6479] ? set_kthread_struct+0x40/0x40\n[ 46.875248][ T6479] ret_from_fork+0x1f/0x30\n[ 46.875773][ T6479]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4439",
"url": "https://www.suse.com/security/cve/CVE-2021-4439"
},
{
"category": "external",
"summary": "SUSE Bug 1226670 for CVE-2021-4439",
"url": "https://bugzilla.suse.com/1226670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-4439"
},
{
"cve": "CVE-2021-47247",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47247"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix use-after-free of encap entry in neigh update handler\n\nFunction mlx5e_rep_neigh_update() wasn\u0027t updated to accommodate rtnl lock\nremoval from TC filter update path and properly handle concurrent encap\nentry insertion/deletion which can lead to following use-after-free:\n\n [23827.464923] ==================================================================\n [23827.469446] BUG: KASAN: use-after-free in mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.470971] Read of size 4 at addr ffff8881d132228c by task kworker/u20:6/21635\n [23827.472251]\n [23827.472615] CPU: 9 PID: 21635 Comm: kworker/u20:6 Not tainted 5.13.0-rc3+ #5\n [23827.473788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n [23827.475639] Workqueue: mlx5e mlx5e_rep_neigh_update [mlx5_core]\n [23827.476731] Call Trace:\n [23827.477260] dump_stack+0xbb/0x107\n [23827.477906] print_address_description.constprop.0+0x18/0x140\n [23827.478896] ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.479879] ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.480905] kasan_report.cold+0x7c/0xd8\n [23827.481701] ? mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.482744] kasan_check_range+0x145/0x1a0\n [23827.493112] mlx5e_encap_take+0x72/0x140 [mlx5_core]\n [23827.494054] ? mlx5e_tc_tun_encap_info_equal_generic+0x140/0x140 [mlx5_core]\n [23827.495296] mlx5e_rep_neigh_update+0x41e/0x5e0 [mlx5_core]\n [23827.496338] ? mlx5e_rep_neigh_entry_release+0xb80/0xb80 [mlx5_core]\n [23827.497486] ? read_word_at_a_time+0xe/0x20\n [23827.498250] ? strscpy+0xa0/0x2a0\n [23827.498889] process_one_work+0x8ac/0x14e0\n [23827.499638] ? lockdep_hardirqs_on_prepare+0x400/0x400\n [23827.500537] ? pwq_dec_nr_in_flight+0x2c0/0x2c0\n [23827.501359] ? rwlock_bug.part.0+0x90/0x90\n [23827.502116] worker_thread+0x53b/0x1220\n [23827.502831] ? process_one_work+0x14e0/0x14e0\n [23827.503627] kthread+0x328/0x3f0\n [23827.504254] ? _raw_spin_unlock_irq+0x24/0x40\n [23827.505065] ? __kthread_bind_mask+0x90/0x90\n [23827.505912] ret_from_fork+0x1f/0x30\n [23827.506621]\n [23827.506987] Allocated by task 28248:\n [23827.507694] kasan_save_stack+0x1b/0x40\n [23827.508476] __kasan_kmalloc+0x7c/0x90\n [23827.509197] mlx5e_attach_encap+0xde1/0x1d40 [mlx5_core]\n [23827.510194] mlx5e_tc_add_fdb_flow+0x397/0xc40 [mlx5_core]\n [23827.511218] __mlx5e_add_fdb_flow+0x519/0xb30 [mlx5_core]\n [23827.512234] mlx5e_configure_flower+0x191c/0x4870 [mlx5_core]\n [23827.513298] tc_setup_cb_add+0x1d5/0x420\n [23827.514023] fl_hw_replace_filter+0x382/0x6a0 [cls_flower]\n [23827.514975] fl_change+0x2ceb/0x4a51 [cls_flower]\n [23827.515821] tc_new_tfilter+0x89a/0x2070\n [23827.516548] rtnetlink_rcv_msg+0x644/0x8c0\n [23827.517300] netlink_rcv_skb+0x11d/0x340\n [23827.518021] netlink_unicast+0x42b/0x700\n [23827.518742] netlink_sendmsg+0x743/0xc20\n [23827.519467] sock_sendmsg+0xb2/0xe0\n [23827.520131] ____sys_sendmsg+0x590/0x770\n [23827.520851] ___sys_sendmsg+0xd8/0x160\n [23827.521552] __sys_sendmsg+0xb7/0x140\n [23827.522238] do_syscall_64+0x3a/0x70\n [23827.522907] entry_SYSCALL_64_after_hwframe+0x44/0xae\n [23827.523797]\n [23827.524163] Freed by task 25948:\n [23827.524780] kasan_save_stack+0x1b/0x40\n [23827.525488] kasan_set_track+0x1c/0x30\n [23827.526187] kasan_set_free_info+0x20/0x30\n [23827.526968] __kasan_slab_free+0xed/0x130\n [23827.527709] slab_free_freelist_hook+0xcf/0x1d0\n [23827.528528] kmem_cache_free_bulk+0x33a/0x6e0\n [23827.529317] kfree_rcu_work+0x55f/0xb70\n [23827.530024] process_one_work+0x8ac/0x14e0\n [23827.530770] worker_thread+0x53b/0x1220\n [23827.531480] kthread+0x328/0x3f0\n [23827.532114] ret_from_fork+0x1f/0x30\n [23827.532785]\n [23827.533147] Last potentially related work creation:\n [23827.534007] kasan_save_stack+0x1b/0x40\n [23827.534710] kasan_record_aux_stack+0xab/0xc0\n [23827.535492] kvfree_call_rcu+0x31/0x7b0\n [23827.536206] mlx5e_tc_del\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47247",
"url": "https://www.suse.com/security/cve/CVE-2021-47247"
},
{
"category": "external",
"summary": "SUSE Bug 1224865 for CVE-2021-47247",
"url": "https://bugzilla.suse.com/1224865"
},
{
"category": "external",
"summary": "SUSE Bug 1227500 for CVE-2021-47247",
"url": "https://bugzilla.suse.com/1227500"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2021-47247"
},
{
"cve": "CVE-2021-47311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47311"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: qcom/emac: fix UAF in emac_remove\n\nadpt is netdev private data and it cannot be\nused after free_netdev() call. Using adpt after free_netdev()\ncan cause UAF bug. Fix it by moving free_netdev() at the end of the\nfunction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47311",
"url": "https://www.suse.com/security/cve/CVE-2021-47311"
},
{
"category": "external",
"summary": "SUSE Bug 1225010 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1225010"
},
{
"category": "external",
"summary": "SUSE Bug 1227752 for CVE-2021-47311",
"url": "https://bugzilla.suse.com/1227752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47311"
},
{
"cve": "CVE-2021-47328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47328"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix conn use after free during resets\n\nIf we haven\u0027t done a unbind target call we can race where\niscsi_conn_teardown wakes up the EH thread and then frees the conn while\nthose threads are still accessing the conn ehwait.\n\nWe can only do one TMF per session so this just moves the TMF fields from\nthe conn to the session. We can then rely on the\niscsi_session_teardown-\u003eiscsi_remove_session-\u003e__iscsi_unbind_session call\nto remove the target and it\u0027s devices, and know after that point there is\nno device or scsi-ml callout trying to access the session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47328",
"url": "https://www.suse.com/security/cve/CVE-2021-47328"
},
{
"category": "external",
"summary": "SUSE Bug 1225047 for CVE-2021-47328",
"url": "https://bugzilla.suse.com/1225047"
},
{
"category": "external",
"summary": "SUSE Bug 1225080 for CVE-2021-47328",
"url": "https://bugzilla.suse.com/1225080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47328"
},
{
"cve": "CVE-2021-47368",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47368"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nenetc: Fix illegal access when reading affinity_hint\n\nirq_set_affinity_hit() stores a reference to the cpumask_t\nparameter in the irq descriptor, and that reference can be\naccessed later from irq_affinity_hint_proc_show(). Since\nthe cpu_mask parameter passed to irq_set_affinity_hit() has\nonly temporary storage (it\u0027s on the stack memory), later\naccesses to it are illegal. Thus reads from the corresponding\nprocfs affinity_hint file can result in paging request oops.\n\nThe issue is fixed by the get_cpu_mask() helper, which provides\na permanent storage for the cpumask_t parameter.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47368",
"url": "https://www.suse.com/security/cve/CVE-2021-47368"
},
{
"category": "external",
"summary": "SUSE Bug 1225161 for CVE-2021-47368",
"url": "https://bugzilla.suse.com/1225161"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47368"
},
{
"cve": "CVE-2021-47372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47372"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix use after free on rmmod\n\nplat_dev-\u003edev-\u003eplatform_data is released by platform_device_unregister(),\nuse of pclk and hclk is a use-after-free. Since device unregister won\u0027t\nneed a clk device we adjust the function call sequence to fix this issue.\n\n[ 31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci]\n[ 31.275563] Freed by task 306:\n[ 30.276782] platform_device_release+0x25/0x80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47372",
"url": "https://www.suse.com/security/cve/CVE-2021-47372"
},
{
"category": "external",
"summary": "SUSE Bug 1225184 for CVE-2021-47372",
"url": "https://bugzilla.suse.com/1225184"
},
{
"category": "external",
"summary": "SUSE Bug 1229946 for CVE-2021-47372",
"url": "https://bugzilla.suse.com/1229946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2021-47372"
},
{
"cve": "CVE-2021-47379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd\n\nKASAN reports a use-after-free report when doing fuzz test:\n\n[693354.104835] ==================================================================\n[693354.105094] BUG: KASAN: use-after-free in bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105336] Read of size 4 at addr ffff888be0a35664 by task sh/1453338\n\n[693354.105607] CPU: 41 PID: 1453338 Comm: sh Kdump: loaded Not tainted 4.18.0-147\n[693354.105610] Hardware name: Huawei 2288H V5/BC11SPSCB0, BIOS 0.81 07/02/2018\n[693354.105612] Call Trace:\n[693354.105621] dump_stack+0xf1/0x19b\n[693354.105626] ? show_regs_print_info+0x5/0x5\n[693354.105634] ? printk+0x9c/0xc3\n[693354.105638] ? cpumask_weight+0x1f/0x1f\n[693354.105648] print_address_description+0x70/0x360\n[693354.105654] kasan_report+0x1b2/0x330\n[693354.105659] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105665] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105670] bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105675] ? bfq_cpd_init+0x20/0x20\n[693354.105683] cgroup_file_write+0x3aa/0x510\n[693354.105693] ? ___slab_alloc+0x507/0x540\n[693354.105698] ? cgroup_file_poll+0x60/0x60\n[693354.105702] ? 0xffffffff89600000\n[693354.105708] ? usercopy_abort+0x90/0x90\n[693354.105716] ? mutex_lock+0xef/0x180\n[693354.105726] kernfs_fop_write+0x1ab/0x280\n[693354.105732] ? cgroup_file_poll+0x60/0x60\n[693354.105738] vfs_write+0xe7/0x230\n[693354.105744] ksys_write+0xb0/0x140\n[693354.105749] ? __ia32_sys_read+0x50/0x50\n[693354.105760] do_syscall_64+0x112/0x370\n[693354.105766] ? syscall_return_slowpath+0x260/0x260\n[693354.105772] ? do_page_fault+0x9b/0x270\n[693354.105779] ? prepare_exit_to_usermode+0xf9/0x1a0\n[693354.105784] ? enter_from_user_mode+0x30/0x30\n[693354.105793] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.105875] Allocated by task 1453337:\n[693354.106001] kasan_kmalloc+0xa0/0xd0\n[693354.106006] kmem_cache_alloc_node_trace+0x108/0x220\n[693354.106010] bfq_pd_alloc+0x96/0x120\n[693354.106015] blkcg_activate_policy+0x1b7/0x2b0\n[693354.106020] bfq_create_group_hierarchy+0x1e/0x80\n[693354.106026] bfq_init_queue+0x678/0x8c0\n[693354.106031] blk_mq_init_sched+0x1f8/0x460\n[693354.106037] elevator_switch_mq+0xe1/0x240\n[693354.106041] elevator_switch+0x25/0x40\n[693354.106045] elv_iosched_store+0x1a1/0x230\n[693354.106049] queue_attr_store+0x78/0xb0\n[693354.106053] kernfs_fop_write+0x1ab/0x280\n[693354.106056] vfs_write+0xe7/0x230\n[693354.106060] ksys_write+0xb0/0x140\n[693354.106064] do_syscall_64+0x112/0x370\n[693354.106069] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106114] Freed by task 1453336:\n[693354.106225] __kasan_slab_free+0x130/0x180\n[693354.106229] kfree+0x90/0x1b0\n[693354.106233] blkcg_deactivate_policy+0x12c/0x220\n[693354.106238] bfq_exit_queue+0xf5/0x110\n[693354.106241] blk_mq_exit_sched+0x104/0x130\n[693354.106245] __elevator_exit+0x45/0x60\n[693354.106249] elevator_switch_mq+0xd6/0x240\n[693354.106253] elevator_switch+0x25/0x40\n[693354.106257] elv_iosched_store+0x1a1/0x230\n[693354.106261] queue_attr_store+0x78/0xb0\n[693354.106264] kernfs_fop_write+0x1ab/0x280\n[693354.106268] vfs_write+0xe7/0x230\n[693354.106271] ksys_write+0xb0/0x140\n[693354.106275] do_syscall_64+0x112/0x370\n[693354.106280] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106329] The buggy address belongs to the object at ffff888be0a35580\n which belongs to the cache kmalloc-1k of size 1024\n[693354.106736] The buggy address is located 228 bytes inside of\n 1024-byte region [ffff888be0a35580, ffff888be0a35980)\n[693354.107114] The buggy address belongs to the page:\n[693354.107273] page:ffffea002f828c00 count:1 mapcount:0 mapping:ffff888107c17080 index:0x0 compound_mapcount: 0\n[693354.107606] flags: 0x17ffffc0008100(slab|head)\n[693354.107760] raw: 0017ffffc0008100 ffffea002fcbc808 ffffea0030bd3a08 ffff888107c17080\n[693354.108020] r\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47379",
"url": "https://www.suse.com/security/cve/CVE-2021-47379"
},
{
"category": "external",
"summary": "SUSE Bug 1225203 for CVE-2021-47379",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "external",
"summary": "SUSE Bug 1225204 for CVE-2021-47379",
"url": "https://bugzilla.suse.com/1225204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47379"
},
{
"cve": "CVE-2021-47571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47571"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()\n\nThe free_rtllib() function frees the \"dev\" pointer so there is use\nafter free on the next line. Re-arrange things to avoid that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47571",
"url": "https://www.suse.com/security/cve/CVE-2021-47571"
},
{
"category": "external",
"summary": "SUSE Bug 1225518 for CVE-2021-47571",
"url": "https://bugzilla.suse.com/1225518"
},
{
"category": "external",
"summary": "SUSE Bug 1227551 for CVE-2021-47571",
"url": "https://bugzilla.suse.com/1227551"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2021-47571"
},
{
"cve": "CVE-2021-47576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47576"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()\n\nIn resp_mode_select() sanity check the block descriptor len to avoid UAF.\n\nBUG: KASAN: use-after-free in resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509\nRead of size 1 at addr ffff888026670f50 by task scsicmd/15032\n\nCPU: 1 PID: 15032 Comm: scsicmd Not tainted 5.15.0-01d0625 #15\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:107\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:257\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:443\n __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:306\n resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509\n schedule_resp+0x4af/0x1a10 drivers/scsi/scsi_debug.c:5483\n scsi_debug_queuecommand+0x8c9/0x1e70 drivers/scsi/scsi_debug.c:7537\n scsi_queue_rq+0x16b4/0x2d10 drivers/scsi/scsi_lib.c:1521\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1640\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1762\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1839\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:63\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:837\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:775\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:941\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1166\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:52\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:50\n entry_SYSCALL_64_after_hwframe+0x44/0xae arch/x86/entry/entry_64.S:113",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47576",
"url": "https://www.suse.com/security/cve/CVE-2021-47576"
},
{
"category": "external",
"summary": "SUSE Bug 1226537 for CVE-2021-47576",
"url": "https://bugzilla.suse.com/1226537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "low"
}
],
"title": "CVE-2021-47576"
},
{
"cve": "CVE-2021-47583",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47583"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: mxl111sf: change mutex_init() location\n\nSyzbot reported, that mxl111sf_ctrl_msg() uses uninitialized\nmutex. The problem was in wrong mutex_init() location.\n\nPrevious mutex_init(\u0026state-\u003emsg_lock) call was in -\u003einit() function, but\ndvb_usbv2_init() has this order of calls:\n\n\tdvb_usbv2_init()\n\t dvb_usbv2_adapter_init()\n\t dvb_usbv2_adapter_frontend_init()\n\t props-\u003efrontend_attach()\n\n\t props-\u003einit()\n\nSince mxl111sf_* devices call mxl111sf_ctrl_msg() in -\u003efrontend_attach()\ninternally we need to initialize state-\u003emsg_lock before\nfrontend_attach(). To achieve it, -\u003eprobe() call added to all mxl111sf_*\ndevices, which will simply initiaize mutex.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47583",
"url": "https://www.suse.com/security/cve/CVE-2021-47583"
},
{
"category": "external",
"summary": "SUSE Bug 1226563 for CVE-2021-47583",
"url": "https://bugzilla.suse.com/1226563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47583"
},
{
"cve": "CVE-2021-47589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47589"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigbvf: fix double free in `igbvf_probe`\n\nIn `igbvf_probe`, if register_netdev() fails, the program will go to\nlabel err_hw_init, and then to label err_ioremap. In free_netdev() which\nis just below label err_ioremap, there is `list_for_each_entry_safe` and\n`netif_napi_del` which aims to delete all entries in `dev-\u003enapi_list`.\nThe program has added an entry `adapter-\u003erx_ring-\u003enapi` which is added by\n`netif_napi_add` in igbvf_alloc_queues(). However, adapter-\u003erx_ring has\nbeen freed below label err_hw_init. So this a UAF.\n\nIn terms of how to patch the problem, we can refer to igbvf_remove() and\ndelete the entry before `adapter-\u003erx_ring`.\n\nThe KASAN logs are as follows:\n\n[ 35.126075] BUG: KASAN: use-after-free in free_netdev+0x1fd/0x450\n[ 35.127170] Read of size 8 at addr ffff88810126d990 by task modprobe/366\n[ 35.128360]\n[ 35.128643] CPU: 1 PID: 366 Comm: modprobe Not tainted 5.15.0-rc2+ #14\n[ 35.129789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[ 35.131749] Call Trace:\n[ 35.132199] dump_stack_lvl+0x59/0x7b\n[ 35.132865] print_address_description+0x7c/0x3b0\n[ 35.133707] ? free_netdev+0x1fd/0x450\n[ 35.134378] __kasan_report+0x160/0x1c0\n[ 35.135063] ? free_netdev+0x1fd/0x450\n[ 35.135738] kasan_report+0x4b/0x70\n[ 35.136367] free_netdev+0x1fd/0x450\n[ 35.137006] igbvf_probe+0x121d/0x1a10 [igbvf]\n[ 35.137808] ? igbvf_vlan_rx_add_vid+0x100/0x100 [igbvf]\n[ 35.138751] local_pci_probe+0x13c/0x1f0\n[ 35.139461] pci_device_probe+0x37e/0x6c0\n[ 35.165526]\n[ 35.165806] Allocated by task 366:\n[ 35.166414] ____kasan_kmalloc+0xc4/0xf0\n[ 35.167117] foo_kmem_cache_alloc_trace+0x3c/0x50 [igbvf]\n[ 35.168078] igbvf_probe+0x9c5/0x1a10 [igbvf]\n[ 35.168866] local_pci_probe+0x13c/0x1f0\n[ 35.169565] pci_device_probe+0x37e/0x6c0\n[ 35.179713]\n[ 35.179993] Freed by task 366:\n[ 35.180539] kasan_set_track+0x4c/0x80\n[ 35.181211] kasan_set_free_info+0x1f/0x40\n[ 35.181942] ____kasan_slab_free+0x103/0x140\n[ 35.182703] kfree+0xe3/0x250\n[ 35.183239] igbvf_probe+0x1173/0x1a10 [igbvf]\n[ 35.184040] local_pci_probe+0x13c/0x1f0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47589",
"url": "https://www.suse.com/security/cve/CVE-2021-47589"
},
{
"category": "external",
"summary": "SUSE Bug 1226557 for CVE-2021-47589",
"url": "https://bugzilla.suse.com/1226557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47589"
},
{
"cve": "CVE-2021-47595",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47595"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: sch_ets: don\u0027t remove idle classes from the round-robin list\n\nShuang reported that the following script:\n\n 1) tc qdisc add dev ddd0 handle 10: parent 1: ets bands 8 strict 4 priomap 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7 7\n 2) mausezahn ddd0 -A 10.10.10.1 -B 10.10.10.2 -c 0 -a own -b 00:c1:a0:c1:a0:00 -t udp \u0026\n 3) tc qdisc change dev ddd0 handle 10: ets bands 4 strict 2 quanta 2500 2500 priomap 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3\n\ncrashes systematically when line 2) is commented:\n\n list_del corruption, ffff8e028404bd30-\u003enext is LIST_POISON1 (dead000000000100)\n ------------[ cut here ]------------\n kernel BUG at lib/list_debug.c:47!\n invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n CPU: 0 PID: 954 Comm: tc Not tainted 5.16.0-rc4+ #478\n Hardware name: Red Hat KVM, BIOS 1.11.1-4.module+el8.1.0+4066+0f1aadab 04/01/2014\n RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47\n Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff \u003c0f\u003e 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe\n RSP: 0018:ffffae46807a3888 EFLAGS: 00010246\n RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202\n RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff\n RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff\n R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800\n R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400\n FS: 00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000682f48 CR3: 00000001058be000 CR4: 0000000000350ef0\n Call Trace:\n \u003cTASK\u003e\n ets_qdisc_change+0x58b/0xa70 [sch_ets]\n tc_modify_qdisc+0x323/0x880\n rtnetlink_rcv_msg+0x169/0x4a0\n netlink_rcv_skb+0x50/0x100\n netlink_unicast+0x1a5/0x280\n netlink_sendmsg+0x257/0x4d0\n sock_sendmsg+0x5b/0x60\n ____sys_sendmsg+0x1f2/0x260\n ___sys_sendmsg+0x7c/0xc0\n __sys_sendmsg+0x57/0xa0\n do_syscall_64+0x3a/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7efdc8031338\n Code: 89 02 48 c7 c0 ff ff ff ff eb b5 0f 1f 80 00 00 00 00 f3 0f 1e fa 48 8d 05 25 43 2c 00 8b 00 85 c0 75 17 b8 2e 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 58 c3 0f 1f 80 00 00 00 00 41 54 41 89 d4 55\n RSP: 002b:00007ffdf1ce9828 EFLAGS: 00000246 ORIG_RAX: 000000000000002e\n RAX: ffffffffffffffda RBX: 0000000061b37a97 RCX: 00007efdc8031338\n RDX: 0000000000000000 RSI: 00007ffdf1ce9890 RDI: 0000000000000003\n RBP: 0000000000000000 R08: 0000000000000001 R09: 000000000078a940\n R10: 000000000000000c R11: 0000000000000246 R12: 0000000000000001\n R13: 0000000000688880 R14: 0000000000000000 R15: 0000000000000000\n \u003c/TASK\u003e\n Modules linked in: sch_ets sch_tbf dummy rfkill iTCO_wdt iTCO_vendor_support intel_rapl_msr intel_rapl_common joydev pcspkr i2c_i801 virtio_balloon i2c_smbus lpc_ich ip_tables xfs libcrc32c crct10dif_pclmul crc32_pclmul crc32c_intel serio_raw ghash_clmulni_intel ahci libahci libata virtio_blk virtio_console virtio_net net_failover failover sunrpc dm_mirror dm_region_hash dm_log dm_mod [last unloaded: sch_ets]\n ---[ end trace f35878d1912655c2 ]---\n RIP: 0010:__list_del_entry_valid.cold.1+0x12/0x47\n Code: fe ff 0f 0b 48 89 c1 4c 89 c6 48 c7 c7 08 42 1b 87 e8 1d c5 fe ff 0f 0b 48 89 fe 48 89 c2 48 c7 c7 98 42 1b 87 e8 09 c5 fe ff \u003c0f\u003e 0b 48 c7 c7 48 43 1b 87 e8 fb c4 fe ff 0f 0b 48 89 f2 48 89 fe\n RSP: 0018:ffffae46807a3888 EFLAGS: 00010246\n RAX: 000000000000004e RBX: 0000000000000007 RCX: 0000000000000202\n RDX: 0000000000000000 RSI: ffffffff871ac536 RDI: 00000000ffffffff\n RBP: ffffae46807a3a10 R08: 0000000000000000 R09: c0000000ffff7fff\n R10: 0000000000000001 R11: ffffae46807a36a8 R12: ffff8e028404b800\n R13: ffff8e028404bd30 R14: dead000000000100 R15: ffff8e02fafa2400\n FS: 00007efdc92e4480(0000) GS:ffff8e02fb600000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 000000000\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47595",
"url": "https://www.suse.com/security/cve/CVE-2021-47595"
},
{
"category": "external",
"summary": "SUSE Bug 1226552 for CVE-2021-47595",
"url": "https://bugzilla.suse.com/1226552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47595"
},
{
"cve": "CVE-2021-47596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47596"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix use-after-free bug in hclgevf_send_mbx_msg\n\nCurrently, the hns3_remove function firstly uninstall client instance,\nand then uninstall acceletion engine device. The netdevice is freed in\nclient instance uninstall process, but acceletion engine device uninstall\nprocess still use it to trace runtime information. This causes a use after\nfree problem.\n\nSo fixes it by check the instance register state to avoid use after free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47596",
"url": "https://www.suse.com/security/cve/CVE-2021-47596"
},
{
"category": "external",
"summary": "SUSE Bug 1226558 for CVE-2021-47596",
"url": "https://bugzilla.suse.com/1226558"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47596"
},
{
"cve": "CVE-2021-47600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47600"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: fix use after free in rebalance_children()\n\nMove dm_tm_unlock() after dm_tm_dec().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47600",
"url": "https://www.suse.com/security/cve/CVE-2021-47600"
},
{
"category": "external",
"summary": "SUSE Bug 1226575 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "external",
"summary": "SUSE Bug 1227472 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1227472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47600"
},
{
"cve": "CVE-2021-47602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: track only QoS data frames for admission control\n\nFor admission control, obviously all of that only works for\nQoS data frames, otherwise we cannot even access the QoS\nfield in the header.\n\nSyzbot reported (see below) an uninitialized value here due\nto a status of a non-QoS nullfunc packet, which isn\u0027t even\nlong enough to contain the QoS header.\n\nFix this to only do anything for QoS data packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47602",
"url": "https://www.suse.com/security/cve/CVE-2021-47602"
},
{
"category": "external",
"summary": "SUSE Bug 1226554 for CVE-2021-47602",
"url": "https://bugzilla.suse.com/1226554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47602"
},
{
"cve": "CVE-2021-47609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47609"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Fix string overflow in SCPI genpd driver\n\nWithout the bound checks for scpi_pd-\u003ename, it could result in the buffer\noverflow when copying the SCPI device name from the corresponding device\ntree node as the name string is set at maximum size of 30.\n\nLet us fix it by using devm_kasprintf so that the string buffer is\nallocated dynamically.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47609",
"url": "https://www.suse.com/security/cve/CVE-2021-47609"
},
{
"category": "external",
"summary": "SUSE Bug 1226562 for CVE-2021-47609",
"url": "https://bugzilla.suse.com/1226562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47609"
},
{
"cve": "CVE-2021-47611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47611"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: validate extended element ID is present\n\nBefore attempting to parse an extended element, verify that\nthe extended element ID is present.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47611",
"url": "https://www.suse.com/security/cve/CVE-2021-47611"
},
{
"category": "external",
"summary": "SUSE Bug 1226583 for CVE-2021-47611",
"url": "https://bugzilla.suse.com/1226583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47611"
},
{
"cve": "CVE-2021-47612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47612"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: fix segfault in nfc_genl_dump_devices_done\n\nWhen kmalloc in nfc_genl_dump_devices() fails then\nnfc_genl_dump_devices_done() segfaults as below\n\nKASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]\nCPU: 0 PID: 25 Comm: kworker/0:1 Not tainted 5.16.0-rc4-01180-g2a987e65025e-dirty #5\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-6.fc35 04/01/2014\nWorkqueue: events netlink_sock_destruct_work\nRIP: 0010:klist_iter_exit+0x26/0x80\nCall Trace:\n\u003cTASK\u003e\nclass_dev_iter_exit+0x15/0x20\nnfc_genl_dump_devices_done+0x3b/0x50\ngenl_lock_done+0x84/0xd0\nnetlink_sock_destruct+0x8f/0x270\n__sk_destruct+0x64/0x3b0\nsk_destruct+0xa8/0xd0\n__sk_free+0x2e8/0x3d0\nsk_free+0x51/0x90\nnetlink_sock_destruct_work+0x1c/0x20\nprocess_one_work+0x411/0x710\nworker_thread+0x6fd/0xa80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47612",
"url": "https://www.suse.com/security/cve/CVE-2021-47612"
},
{
"category": "external",
"summary": "SUSE Bug 1226585 for CVE-2021-47612",
"url": "https://bugzilla.suse.com/1226585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47612"
},
{
"cve": "CVE-2021-47617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47617"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: pciehp: Fix infinite loop in IRQ handler upon power fault\n\nThe Power Fault Detected bit in the Slot Status register differs from\nall other hotplug events in that it is sticky: It can only be cleared\nafter turning off slot power. Per PCIe r5.0, sec. 6.7.1.8:\n\n If a power controller detects a main power fault on the hot-plug slot,\n it must automatically set its internal main power fault latch [...].\n The main power fault latch is cleared when software turns off power to\n the hot-plug slot.\n\nThe stickiness used to cause interrupt storms and infinite loops which\nwere fixed in 2009 by commits 5651c48cfafe (\"PCI pciehp: fix power fault\ninterrupt storm problem\") and 99f0169c17f3 (\"PCI: pciehp: enable\nsoftware notification on empty slots\").\n\nUnfortunately in 2020 the infinite loop issue was inadvertently\nreintroduced by commit 8edf5332c393 (\"PCI: pciehp: Fix MSI interrupt\nrace\"): The hardirq handler pciehp_isr() clears the PFD bit until\npciehp\u0027s power_fault_detected flag is set. That happens in the IRQ\nthread pciehp_ist(), which never learns of the event because the hardirq\nhandler is stuck in an infinite loop. Fix by setting the\npower_fault_detected flag already in the hardirq handler.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47617",
"url": "https://www.suse.com/security/cve/CVE-2021-47617"
},
{
"category": "external",
"summary": "SUSE Bug 1226614 for CVE-2021-47617",
"url": "https://bugzilla.suse.com/1226614"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47617"
},
{
"cve": "CVE-2021-47618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47618"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nARM: 9170/1: fix panic when kasan and kprobe are enabled\n\narm32 uses software to simulate the instruction replaced\nby kprobe. some instructions may be simulated by constructing\nassembly functions. therefore, before executing instruction\nsimulation, it is necessary to construct assembly function\nexecution environment in C language through binding registers.\nafter kasan is enabled, the register binding relationship will\nbe destroyed, resulting in instruction simulation errors and\ncausing kernel panic.\n\nthe kprobe emulate instruction function is distributed in three\nfiles: actions-common.c actions-arm.c actions-thumb.c, so disable\nKASAN when compiling these files.\n\nfor example, use kprobe insert on cap_capable+20 after kasan\nenabled, the cap_capable assembly code is as follows:\n\u003ccap_capable\u003e:\ne92d47f0\tpush\t{r4, r5, r6, r7, r8, r9, sl, lr}\ne1a05000\tmov\tr5, r0\ne280006c\tadd\tr0, r0, #108 ; 0x6c\ne1a04001\tmov\tr4, r1\ne1a06002\tmov\tr6, r2\ne59fa090\tldr\tsl, [pc, #144] ;\nebfc7bf8\tbl\tc03aa4b4 \u003c__asan_load4\u003e\ne595706c\tldr\tr7, [r5, #108] ; 0x6c\ne2859014\tadd\tr9, r5, #20\n......\nThe emulate_ldr assembly code after enabling kasan is as follows:\nc06f1384 \u003cemulate_ldr\u003e:\ne92d47f0\tpush\t{r4, r5, r6, r7, r8, r9, sl, lr}\ne282803c\tadd\tr8, r2, #60 ; 0x3c\ne1a05000\tmov\tr5, r0\ne7e37855\tubfx\tr7, r5, #16, #4\ne1a00008\tmov\tr0, r8\ne1a09001\tmov\tr9, r1\ne1a04002\tmov\tr4, r2\nebf35462\tbl\tc03c6530 \u003c__asan_load4\u003e\ne357000f\tcmp\tr7, #15\ne7e36655\tubfx\tr6, r5, #12, #4\ne205a00f\tand\tsl, r5, #15\n0a000001\tbeq\tc06f13bc \u003cemulate_ldr+0x38\u003e\ne0840107\tadd\tr0, r4, r7, lsl #2\nebf3545c\tbl\tc03c6530 \u003c__asan_load4\u003e\ne084010a\tadd\tr0, r4, sl, lsl #2\nebf3545a\tbl\tc03c6530 \u003c__asan_load4\u003e\ne2890010\tadd\tr0, r9, #16\nebf35458\tbl\tc03c6530 \u003c__asan_load4\u003e\ne5990010\tldr\tr0, [r9, #16]\ne12fff30\tblx\tr0\ne356000f\tcm\tr6, #15\n1a000014\tbne\tc06f1430 \u003cemulate_ldr+0xac\u003e\ne1a06000\tmov\tr6, r0\ne2840040\tadd\tr0, r4, #64 ; 0x40\n......\n\nwhen running in emulate_ldr to simulate the ldr instruction, panic\noccurred, and the log is as follows:\nUnable to handle kernel NULL pointer dereference at virtual address\n00000090\npgd = ecb46400\n[00000090] *pgd=2e0fa003, *pmd=00000000\nInternal error: Oops: 206 [#1] SMP ARM\nPC is at cap_capable+0x14/0xb0\nLR is at emulate_ldr+0x50/0xc0\npsr: 600d0293 sp : ecd63af8 ip : 00000004 fp : c0a7c30c\nr10: 00000000 r9 : c30897f4 r8 : ecd63cd4\nr7 : 0000000f r6 : 0000000a r5 : e59fa090 r4 : ecd63c98\nr3 : c06ae294 r2 : 00000000 r1 : b7611300 r0 : bf4ec008\nFlags: nZCv IRQs off FIQs on Mode SVC_32 ISA ARM Segment user\nControl: 32c5387d Table: 2d546400 DAC: 55555555\nProcess bash (pid: 1643, stack limit = 0xecd60190)\n(cap_capable) from (kprobe_handler+0x218/0x340)\n(kprobe_handler) from (kprobe_trap_handler+0x24/0x48)\n(kprobe_trap_handler) from (do_undefinstr+0x13c/0x364)\n(do_undefinstr) from (__und_svc_finish+0x0/0x30)\n(__und_svc_finish) from (cap_capable+0x18/0xb0)\n(cap_capable) from (cap_vm_enough_memory+0x38/0x48)\n(cap_vm_enough_memory) from\n(security_vm_enough_memory_mm+0x48/0x6c)\n(security_vm_enough_memory_mm) from\n(copy_process.constprop.5+0x16b4/0x25c8)\n(copy_process.constprop.5) from (_do_fork+0xe8/0x55c)\n(_do_fork) from (SyS_clone+0x1c/0x24)\n(SyS_clone) from (__sys_trace_return+0x0/0x10)\nCode: 0050a0e1 6c0080e2 0140a0e1 0260a0e1 (f801f0e7)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47618",
"url": "https://www.suse.com/security/cve/CVE-2021-47618"
},
{
"category": "external",
"summary": "SUSE Bug 1226644 for CVE-2021-47618",
"url": "https://bugzilla.suse.com/1226644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47618"
},
{
"cve": "CVE-2021-47619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47619"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix queues reservation for XDP\n\nWhen XDP was configured on a system with large number of CPUs\nand X722 NIC there was a call trace with NULL pointer dereference.\n\ni40e 0000:87:00.0: failed to get tracking for 256 queues for VSI 0 err -12\ni40e 0000:87:00.0: setup of MAIN VSI failed\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nRIP: 0010:i40e_xdp+0xea/0x1b0 [i40e]\nCall Trace:\n? i40e_reconfig_rss_queues+0x130/0x130 [i40e]\ndev_xdp_install+0x61/0xe0\ndev_xdp_attach+0x18a/0x4c0\ndev_change_xdp_fd+0x1e6/0x220\ndo_setlink+0x616/0x1030\n? ahci_port_stop+0x80/0x80\n? ata_qc_issue+0x107/0x1e0\n? lock_timer_base+0x61/0x80\n? __mod_timer+0x202/0x380\nrtnl_setlink+0xe5/0x170\n? bpf_lsm_binder_transaction+0x10/0x10\n? security_capable+0x36/0x50\nrtnetlink_rcv_msg+0x121/0x350\n? rtnl_calcit.isra.0+0x100/0x100\nnetlink_rcv_skb+0x50/0xf0\nnetlink_unicast+0x1d3/0x2a0\nnetlink_sendmsg+0x22a/0x440\nsock_sendmsg+0x5e/0x60\n__sys_sendto+0xf0/0x160\n? __sys_getsockname+0x7e/0xc0\n? _copy_from_user+0x3c/0x80\n? __sys_setsockopt+0xc8/0x1a0\n__x64_sys_sendto+0x20/0x30\ndo_syscall_64+0x33/0x40\nentry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f83fa7a39e0\n\nThis was caused by PF queue pile fragmentation due to\nflow director VSI queue being placed right after main VSI.\nBecause of this main VSI was not able to resize its\nqueue allocation for XDP resulting in no queues allocated\nfor main VSI when XDP was turned on.\n\nFix this by always allocating last queue in PF queue pile\nfor a flow director VSI.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47619",
"url": "https://www.suse.com/security/cve/CVE-2021-47619"
},
{
"category": "external",
"summary": "SUSE Bug 1226645 for CVE-2021-47619",
"url": "https://bugzilla.suse.com/1226645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2021-47619"
},
{
"cve": "CVE-2021-47620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47620"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: refactor malicious adv data check\n\nCheck for out-of-bound read was being performed at the end of while\nnum_reports loop, and would fill journal with false positives. Added\ncheck to beginning of loop processing so that it doesn\u0027t get checked\nafter ptr has been advanced.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47620",
"url": "https://www.suse.com/security/cve/CVE-2021-47620"
},
{
"category": "external",
"summary": "SUSE Bug 1226669 for CVE-2021-47620",
"url": "https://bugzilla.suse.com/1226669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "low"
}
],
"title": "CVE-2021-47620"
},
{
"cve": "CVE-2022-2938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2938"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2938",
"url": "https://www.suse.com/security/cve/CVE-2022-2938"
},
{
"category": "external",
"summary": "SUSE Bug 1202623 for CVE-2022-2938",
"url": "https://bugzilla.suse.com/1202623"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-2938"
},
{
"cve": "CVE-2022-48711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48711"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: improve size validations for received domain records\n\nThe function tipc_mon_rcv() allows a node to receive and process\ndomain_record structs from peer nodes to track their views of the\nnetwork topology.\n\nThis patch verifies that the number of members in a received domain\nrecord does not exceed the limit defined by MAX_MON_DOMAIN, something\nthat may otherwise lead to a stack overflow.\n\ntipc_mon_rcv() is called from the function tipc_link_proto_rcv(), where\nwe are reading a 32 bit message data length field into a uint16. To\navert any risk of bit overflow, we add an extra sanity check for this in\nthat function. We cannot see that happen with the current code, but\nfuture designers being unaware of this risk, may introduce it by\nallowing delivery of very large (\u003e 64k) sk buffers from the bearer\nlayer. This potential problem was identified by Eric Dumazet.\n\nThis fixes CVE-2022-0435",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48711",
"url": "https://www.suse.com/security/cve/CVE-2022-48711"
},
{
"category": "external",
"summary": "SUSE Bug 1226672 for CVE-2022-48711",
"url": "https://bugzilla.suse.com/1226672"
},
{
"category": "external",
"summary": "SUSE Bug 1227473 for CVE-2022-48711",
"url": "https://bugzilla.suse.com/1227473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48711"
},
{
"cve": "CVE-2022-48715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48715"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Make bnx2fc_recv_frame() mp safe\n\nRunning tests with a debug kernel shows that bnx2fc_recv_frame() is\nmodifying the per_cpu lport stats counters in a non-mpsafe way. Just boot\na debug kernel and run the bnx2fc driver with the hardware enabled.\n\n[ 1391.699147] BUG: using smp_processor_id() in preemptible [00000000] code: bnx2fc_\n[ 1391.699160] caller is bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]\n[ 1391.699174] CPU: 2 PID: 4355 Comm: bnx2fc_l2_threa Kdump: loaded Tainted: G B\n[ 1391.699180] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013\n[ 1391.699183] Call Trace:\n[ 1391.699188] dump_stack_lvl+0x57/0x7d\n[ 1391.699198] check_preemption_disabled+0xc8/0xd0\n[ 1391.699205] bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]\n[ 1391.699215] ? do_raw_spin_trylock+0xb5/0x180\n[ 1391.699221] ? bnx2fc_npiv_create_vports.isra.0+0x4e0/0x4e0 [bnx2fc]\n[ 1391.699229] ? bnx2fc_l2_rcv_thread+0xb7/0x3a0 [bnx2fc]\n[ 1391.699240] bnx2fc_l2_rcv_thread+0x1af/0x3a0 [bnx2fc]\n[ 1391.699250] ? bnx2fc_ulp_init+0xc0/0xc0 [bnx2fc]\n[ 1391.699258] kthread+0x364/0x420\n[ 1391.699263] ? _raw_spin_unlock_irq+0x24/0x50\n[ 1391.699268] ? set_kthread_struct+0x100/0x100\n[ 1391.699273] ret_from_fork+0x22/0x30\n\nRestore the old get_cpu/put_cpu code with some modifications to reduce the\nsize of the critical section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48715",
"url": "https://www.suse.com/security/cve/CVE-2022-48715"
},
{
"category": "external",
"summary": "SUSE Bug 1226621 for CVE-2022-48715",
"url": "https://bugzilla.suse.com/1226621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "low"
}
],
"title": "CVE-2022-48715"
},
{
"cve": "CVE-2022-48717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48717"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: max9759: fix underflow in speaker_gain_control_put()\n\nCheck for negative values of \"priv-\u003egain\" to prevent an out of bounds\naccess. The concern is that these might come from the user via:\n -\u003e snd_ctl_elem_write_user()\n -\u003e snd_ctl_elem_write()\n -\u003e kctl-\u003eput()",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48717",
"url": "https://www.suse.com/security/cve/CVE-2022-48717"
},
{
"category": "external",
"summary": "SUSE Bug 1226679 for CVE-2022-48717",
"url": "https://bugzilla.suse.com/1226679"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48717"
},
{
"cve": "CVE-2022-48722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ieee802154: ca8210: Stop leaking skb\u0027s\n\nUpon error the ieee802154_xmit_complete() helper is not called. Only\nieee802154_wake_queue() is called manually. We then leak the skb\nstructure.\n\nFree the skb structure upon error before returning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48722",
"url": "https://www.suse.com/security/cve/CVE-2022-48722"
},
{
"category": "external",
"summary": "SUSE Bug 1226619 for CVE-2022-48722",
"url": "https://bugzilla.suse.com/1226619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48722"
},
{
"cve": "CVE-2022-48724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48724"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()\n\nAfter commit e3beca48a45b (\"irqdomain/treewide: Keep firmware node\nunconditionally allocated\"). For tear down scenario, fn is only freed\nafter fail to allocate ir_domain, though it also should be freed in case\ndmar_enable_qi returns error.\n\nBesides free fn, irq_domain and ir_msi_domain need to be removed as well\nif intel_setup_irq_remapping fails to enable queued invalidation.\n\nImprove the rewinding path by add out_free_ir_domain and out_free_fwnode\nlables per Baolu\u0027s suggestion.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48724",
"url": "https://www.suse.com/security/cve/CVE-2022-48724"
},
{
"category": "external",
"summary": "SUSE Bug 1226624 for CVE-2022-48724",
"url": "https://bugzilla.suse.com/1226624"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48724"
},
{
"cve": "CVE-2022-48726",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48726"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/ucma: Protect mc during concurrent multicast leaves\n\nPartially revert the commit mentioned in the Fixes line to make sure that\nallocation and erasing multicast struct are locked.\n\n BUG: KASAN: use-after-free in ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]\n BUG: KASAN: use-after-free in ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579\n Read of size 8 at addr ffff88801bb74b00 by task syz-executor.1/25529\n CPU: 0 PID: 25529 Comm: syz-executor.1 Not tainted 5.16.0-rc7-syzkaller #0\n Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\n Call Trace:\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247\n __kasan_report mm/kasan/report.c:433 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:450\n ucma_cleanup_multicast drivers/infiniband/core/ucma.c:491 [inline]\n ucma_destroy_private_ctx+0x914/0xb70 drivers/infiniband/core/ucma.c:579\n ucma_destroy_id+0x1e6/0x280 drivers/infiniband/core/ucma.c:614\n ucma_write+0x25c/0x350 drivers/infiniband/core/ucma.c:1732\n vfs_write+0x28e/0xae0 fs/read_write.c:588\n ksys_write+0x1ee/0x250 fs/read_write.c:643\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nCurrently the xarray search can touch a concurrently freeing mc as the\nxa_for_each() is not surrounded by any lock. Rather than hold the lock for\na full scan hold it only for the effected items, which is usually an empty\nlist.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48726",
"url": "https://www.suse.com/security/cve/CVE-2022-48726"
},
{
"category": "external",
"summary": "SUSE Bug 1226686 for CVE-2022-48726",
"url": "https://bugzilla.suse.com/1226686"
},
{
"category": "external",
"summary": "SUSE Bug 1227552 for CVE-2022-48726",
"url": "https://bugzilla.suse.com/1227552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48726"
},
{
"cve": "CVE-2022-48728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48728"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nIB/hfi1: Fix AIP early init panic\n\nAn early failure in hfi1_ipoib_setup_rn() can lead to the following panic:\n\n BUG: unable to handle kernel NULL pointer dereference at 00000000000001b0\n PGD 0 P4D 0\n Oops: 0002 [#1] SMP NOPTI\n Workqueue: events work_for_cpu_fn\n RIP: 0010:try_to_grab_pending+0x2b/0x140\n Code: 1f 44 00 00 41 55 41 54 55 48 89 d5 53 48 89 fb 9c 58 0f 1f 44 00 00 48 89 c2 fa 66 0f 1f 44 00 00 48 89 55 00 40 84 f6 75 77 \u003cf0\u003e 48 0f ba 2b 00 72 09 31 c0 5b 5d 41 5c 41 5d c3 48 89 df e8 6c\n RSP: 0018:ffffb6b3cf7cfa48 EFLAGS: 00010046\n RAX: 0000000000000246 RBX: 00000000000001b0 RCX: 0000000000000000\n RDX: 0000000000000246 RSI: 0000000000000000 RDI: 00000000000001b0\n RBP: ffffb6b3cf7cfa70 R08: 0000000000000f09 R09: 0000000000000001\n R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000000\n R13: ffffb6b3cf7cfa90 R14: ffffffff9b2fbfc0 R15: ffff8a4fdf244690\n FS: 0000000000000000(0000) GS:ffff8a527f400000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00000000000001b0 CR3: 00000017e2410003 CR4: 00000000007706f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n PKRU: 55555554\n Call Trace:\n __cancel_work_timer+0x42/0x190\n ? dev_printk_emit+0x4e/0x70\n iowait_cancel_work+0x15/0x30 [hfi1]\n hfi1_ipoib_txreq_deinit+0x5a/0x220 [hfi1]\n ? dev_err+0x6c/0x90\n hfi1_ipoib_netdev_dtor+0x15/0x30 [hfi1]\n hfi1_ipoib_setup_rn+0x10e/0x150 [hfi1]\n rdma_init_netdev+0x5a/0x80 [ib_core]\n ? hfi1_ipoib_free_rdma_netdev+0x20/0x20 [hfi1]\n ipoib_intf_init+0x6c/0x350 [ib_ipoib]\n ipoib_intf_alloc+0x5c/0xc0 [ib_ipoib]\n ipoib_add_one+0xbe/0x300 [ib_ipoib]\n add_client_context+0x12c/0x1a0 [ib_core]\n enable_device_and_get+0xdc/0x1d0 [ib_core]\n ib_register_device+0x572/0x6b0 [ib_core]\n rvt_register_device+0x11b/0x220 [rdmavt]\n hfi1_register_ib_device+0x6b4/0x770 [hfi1]\n do_init_one.isra.20+0x3e3/0x680 [hfi1]\n local_pci_probe+0x41/0x90\n work_for_cpu_fn+0x16/0x20\n process_one_work+0x1a7/0x360\n ? create_worker+0x1a0/0x1a0\n worker_thread+0x1cf/0x390\n ? create_worker+0x1a0/0x1a0\n kthread+0x116/0x130\n ? kthread_flush_work_fn+0x10/0x10\n ret_from_fork+0x1f/0x40\n\nThe panic happens in hfi1_ipoib_txreq_deinit() because there is a NULL\nderef when hfi1_ipoib_netdev_dtor() is called in this error case.\n\nhfi1_ipoib_txreq_init() and hfi1_ipoib_rxq_init() are self unwinding so\nfix by adjusting the error paths accordingly.\n\nOther changes:\n- hfi1_ipoib_free_rdma_netdev() is deleted including the free_netdev()\n since the netdev core code deletes calls free_netdev()\n- The switch to the accelerated entrances is moved to the success path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48728",
"url": "https://www.suse.com/security/cve/CVE-2022-48728"
},
{
"category": "external",
"summary": "SUSE Bug 1226691 for CVE-2022-48728",
"url": "https://bugzilla.suse.com/1226691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48728"
},
{
"cve": "CVE-2022-48730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48730"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf: heaps: Fix potential spectre v1 gadget\n\nIt appears like nr could be a Spectre v1 gadget as it\u0027s supplied by a\nuser and used as an array index. Prevent the contents\nof kernel memory from being leaked to userspace via speculative\nexecution by using array_index_nospec.\n\n [sumits: added fixes and cc: stable tags]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48730",
"url": "https://www.suse.com/security/cve/CVE-2022-48730"
},
{
"category": "external",
"summary": "SUSE Bug 1226713 for CVE-2022-48730",
"url": "https://bugzilla.suse.com/1226713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48730"
},
{
"cve": "CVE-2022-48732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48732"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: fix off by one in BIOS boundary checking\n\nBounds checking when parsing init scripts embedded in the BIOS reject\naccess to the last byte. This causes driver initialization to fail on\nApple eMac\u0027s with GeForce 2 MX GPUs, leaving the system with no working\nconsole.\n\nThis is probably only seen on OpenFirmware machines like PowerPC Macs\nbecause the BIOS image provided by OF is only the used parts of the ROM,\nnot a power-of-two blocks read from PCI directly so PCs always have\nempty bytes at the end that are never accessed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48732",
"url": "https://www.suse.com/security/cve/CVE-2022-48732"
},
{
"category": "external",
"summary": "SUSE Bug 1226716 for CVE-2022-48732",
"url": "https://bugzilla.suse.com/1226716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48732"
},
{
"cve": "CVE-2022-48736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48736"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48736",
"url": "https://www.suse.com/security/cve/CVE-2022-48736"
},
{
"category": "external",
"summary": "SUSE Bug 1226721 for CVE-2022-48736",
"url": "https://bugzilla.suse.com/1226721"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "low"
}
],
"title": "CVE-2022-48736"
},
{
"cve": "CVE-2022-48737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48737"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48737",
"url": "https://www.suse.com/security/cve/CVE-2022-48737"
},
{
"category": "external",
"summary": "SUSE Bug 1226762 for CVE-2022-48737",
"url": "https://bugzilla.suse.com/1226762"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 0,
"baseSeverity": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "low"
}
],
"title": "CVE-2022-48737"
},
{
"cve": "CVE-2022-48738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48738"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nASoC: ops: Reject out of bounds values in snd_soc_put_volsw()\n\nWe don\u0027t currently validate that the values being set are within the range\nwe advertised to userspace as being valid, do so and reject any values\nthat are out of range.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48738",
"url": "https://www.suse.com/security/cve/CVE-2022-48738"
},
{
"category": "external",
"summary": "SUSE Bug 1226674 for CVE-2022-48738",
"url": "https://bugzilla.suse.com/1226674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48738"
},
{
"cve": "CVE-2022-48746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48746"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix handling of wrong devices during bond netevent\n\nCurrent implementation of bond netevent handler only check if\nthe handled netdev is VF representor and it missing a check if\nthe VF representor is on the same phys device of the bond handling\nthe netevent.\n\nFix by adding the missing check and optimizing the check if\nthe netdev is VF representor so it will not access uninitialized\nprivate data and crashes.\n\nBUG: kernel NULL pointer dereference, address: 000000000000036c\nPGD 0 P4D 0\nOops: 0000 [#1] SMP NOPTI\nWorkqueue: eth3bond0 bond_mii_monitor [bonding]\nRIP: 0010:mlx5e_is_uplink_rep+0xc/0x50 [mlx5_core]\nRSP: 0018:ffff88812d69fd60 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff8881cf800000 RCX: 0000000000000000\nRDX: ffff88812d69fe10 RSI: 000000000000001b RDI: ffff8881cf800880\nRBP: ffff8881cf800000 R08: 00000445cabccf2b R09: 0000000000000008\nR10: 0000000000000004 R11: 0000000000000008 R12: ffff88812d69fe10\nR13: 00000000fffffffe R14: ffff88820c0f9000 R15: 0000000000000000\nFS: 0000000000000000(0000) GS:ffff88846fb00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000000000036c CR3: 0000000103d80006 CR4: 0000000000370ea0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n mlx5e_eswitch_uplink_rep+0x31/0x40 [mlx5_core]\n mlx5e_rep_is_lag_netdev+0x94/0xc0 [mlx5_core]\n mlx5e_rep_esw_bond_netevent+0xeb/0x3d0 [mlx5_core]\n raw_notifier_call_chain+0x41/0x60\n call_netdevice_notifiers_info+0x34/0x80\n netdev_lower_state_changed+0x4e/0xa0\n bond_mii_monitor+0x56b/0x640 [bonding]\n process_one_work+0x1b9/0x390\n worker_thread+0x4d/0x3d0\n ? rescuer_thread+0x350/0x350\n kthread+0x124/0x150\n ? set_kthread_struct+0x40/0x40\n ret_from_fork+0x1f/0x30",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48746",
"url": "https://www.suse.com/security/cve/CVE-2022-48746"
},
{
"category": "external",
"summary": "SUSE Bug 1226703 for CVE-2022-48746",
"url": "https://bugzilla.suse.com/1226703"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48746"
},
{
"cve": "CVE-2022-48747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48747"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: Fix wrong offset in bio_truncate()\n\nbio_truncate() clears the buffer outside of last block of bdev, however\ncurrent bio_truncate() is using the wrong offset of page. So it can\nreturn the uninitialized data.\n\nThis happened when both of truncated/corrupted FS and userspace (via\nbdev) are trying to read the last of bdev.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48747",
"url": "https://www.suse.com/security/cve/CVE-2022-48747"
},
{
"category": "external",
"summary": "SUSE Bug 1226643 for CVE-2022-48747",
"url": "https://bugzilla.suse.com/1226643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48747"
},
{
"cve": "CVE-2022-48748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48748"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bridge: vlan: fix memory leak in __allowed_ingress\n\nWhen using per-vlan state, if vlan snooping and stats are disabled,\nuntagged or priority-tagged ingress frame will go to check pvid state.\nIf the port state is forwarding and the pvid state is not\nlearning/forwarding, untagged or priority-tagged frame will be dropped\nbut skb memory is not freed.\nShould free skb when __allowed_ingress returns false.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48748",
"url": "https://www.suse.com/security/cve/CVE-2022-48748"
},
{
"category": "external",
"summary": "SUSE Bug 1226647 for CVE-2022-48748",
"url": "https://bugzilla.suse.com/1226647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48748"
},
{
"cve": "CVE-2022-48749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48749"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc\n\nThe function performs a check on the \"ctx\" input parameter, however, it\nis used before the check.\n\nInitialize the \"base\" variable after the sanity check to avoid a\npossible NULL pointer dereference.\n\nAddresses-Coverity-ID: 1493866 (\"Null pointer dereference\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48749",
"url": "https://www.suse.com/security/cve/CVE-2022-48749"
},
{
"category": "external",
"summary": "SUSE Bug 1226650 for CVE-2022-48749",
"url": "https://bugzilla.suse.com/1226650"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48749"
},
{
"cve": "CVE-2022-48752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending\n\nRunning selftest with CONFIG_PPC_IRQ_SOFT_MASK_DEBUG enabled in kernel\ntriggered below warning:\n\n[ 172.851380] ------------[ cut here ]------------\n[ 172.851391] WARNING: CPU: 8 PID: 2901 at arch/powerpc/include/asm/hw_irq.h:246 power_pmu_disable+0x270/0x280\n[ 172.851402] Modules linked in: dm_mod bonding nft_ct nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ip_set nf_tables rfkill nfnetlink sunrpc xfs libcrc32c pseries_rng xts vmx_crypto uio_pdrv_genirq uio sch_fq_codel ip_tables ext4 mbcache jbd2 sd_mod t10_pi sg ibmvscsi ibmveth scsi_transport_srp fuse\n[ 172.851442] CPU: 8 PID: 2901 Comm: lost_exception_ Not tainted 5.16.0-rc5-03218-g798527287598 #2\n[ 172.851451] NIP: c00000000013d600 LR: c00000000013d5a4 CTR: c00000000013b180\n[ 172.851458] REGS: c000000017687860 TRAP: 0700 Not tainted (5.16.0-rc5-03218-g798527287598)\n[ 172.851465] MSR: 8000000000029033 \u003cSF,EE,ME,IR,DR,RI,LE\u003e CR: 48004884 XER: 20040000\n[ 172.851482] CFAR: c00000000013d5b4 IRQMASK: 1\n[ 172.851482] GPR00: c00000000013d5a4 c000000017687b00 c000000002a10600 0000000000000004\n[ 172.851482] GPR04: 0000000082004000 c0000008ba08f0a8 0000000000000000 00000008b7ed0000\n[ 172.851482] GPR08: 00000000446194f6 0000000000008000 c00000000013b118 c000000000d58e68\n[ 172.851482] GPR12: c00000000013d390 c00000001ec54a80 0000000000000000 0000000000000000\n[ 172.851482] GPR16: 0000000000000000 0000000000000000 c000000015d5c708 c0000000025396d0\n[ 172.851482] GPR20: 0000000000000000 0000000000000000 c00000000a3bbf40 0000000000000003\n[ 172.851482] GPR24: 0000000000000000 c0000008ba097400 c0000000161e0d00 c00000000a3bb600\n[ 172.851482] GPR28: c000000015d5c700 0000000000000001 0000000082384090 c0000008ba0020d8\n[ 172.851549] NIP [c00000000013d600] power_pmu_disable+0x270/0x280\n[ 172.851557] LR [c00000000013d5a4] power_pmu_disable+0x214/0x280\n[ 172.851565] Call Trace:\n[ 172.851568] [c000000017687b00] [c00000000013d5a4] power_pmu_disable+0x214/0x280 (unreliable)\n[ 172.851579] [c000000017687b40] [c0000000003403ac] perf_pmu_disable+0x4c/0x60\n[ 172.851588] [c000000017687b60] [c0000000003445e4] __perf_event_task_sched_out+0x1d4/0x660\n[ 172.851596] [c000000017687c50] [c000000000d1175c] __schedule+0xbcc/0x12a0\n[ 172.851602] [c000000017687d60] [c000000000d11ea8] schedule+0x78/0x140\n[ 172.851608] [c000000017687d90] [c0000000001a8080] sys_sched_yield+0x20/0x40\n[ 172.851615] [c000000017687db0] [c0000000000334dc] system_call_exception+0x18c/0x380\n[ 172.851622] [c000000017687e10] [c00000000000c74c] system_call_common+0xec/0x268\n\nThe warning indicates that MSR_EE being set(interrupt enabled) when\nthere was an overflown PMC detected. This could happen in\npower_pmu_disable since it runs under interrupt soft disable\ncondition ( local_irq_save ) and not with interrupts hard disabled.\ncommit 2c9ac51b850d (\"powerpc/perf: Fix PMU callbacks to clear\npending PMI before resetting an overflown PMC\") intended to clear\nPMI pending bit in Paca when disabling the PMU. It could happen\nthat PMC gets overflown while code is in power_pmu_disable\ncallback function. Hence add a check to see if PMI pending bit\nis set in Paca before clearing it via clear_pmi_pending.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48752",
"url": "https://www.suse.com/security/cve/CVE-2022-48752"
},
{
"category": "external",
"summary": "SUSE Bug 1226709 for CVE-2022-48752",
"url": "https://bugzilla.suse.com/1226709"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48752"
},
{
"cve": "CVE-2022-48754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48754"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphylib: fix potential use-after-free\n\nCommit bafbdd527d56 (\"phylib: Add device reset GPIO support\") added call\nto phy_device_reset(phydev) after the put_device() call in phy_detach().\n\nThe comment before the put_device() call says that the phydev might go\naway with put_device().\n\nFix potential use-after-free by calling phy_device_reset() before\nput_device().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48754",
"url": "https://www.suse.com/security/cve/CVE-2022-48754"
},
{
"category": "external",
"summary": "SUSE Bug 1226692 for CVE-2022-48754",
"url": "https://bugzilla.suse.com/1226692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48754"
},
{
"cve": "CVE-2022-48756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48756"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dsi: invalid parameter check in msm_dsi_phy_enable\n\nThe function performs a check on the \"phy\" input parameter, however, it\nis used before the check.\n\nInitialize the \"dev\" variable after the sanity check to avoid a possible\nNULL pointer dereference.\n\nAddresses-Coverity-ID: 1493860 (\"Null pointer dereference\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48756",
"url": "https://www.suse.com/security/cve/CVE-2022-48756"
},
{
"category": "external",
"summary": "SUSE Bug 1226698 for CVE-2022-48756",
"url": "https://bugzilla.suse.com/1226698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48756"
},
{
"cve": "CVE-2022-48758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48758"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()\n\nThe bnx2fc_destroy() functions are removing the interface before calling\ndestroy_work. This results multiple WARNings from sysfs_remove_group() as\nthe controller rport device attributes are removed too early.\n\nReplace the fcoe_port\u0027s destroy_work queue. It\u0027s not needed.\n\nThe problem is easily reproducible with the following steps.\n\nExample:\n\n $ dmesg -w \u0026\n $ systemctl enable --now fcoe\n $ fipvlan -s -c ens2f1\n $ fcoeadm -d ens2f1.802\n [ 583.464488] host2: libfc: Link down on port (7500a1)\n [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!!\n [ 583.490468] ------------[ cut here ]------------\n [ 583.538725] sysfs group \u0027power\u0027 not found for kobject \u0027rport-2:0-0\u0027\n [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80\n [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ...\n [ 583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1\n [ 583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013\n [ 584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc]\n [ 584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80\n [ 584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ...\n [ 584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282\n [ 584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000\n [ 584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0\n [ 584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00\n [ 584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400\n [ 584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004\n [ 584.355379] FS: 0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000\n [ 584.394419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0\n [ 584.454888] Call Trace:\n [ 584.466108] device_del+0xb2/0x3e0\n [ 584.481701] device_unregister+0x13/0x60\n [ 584.501306] bsg_unregister_queue+0x5b/0x80\n [ 584.522029] bsg_remove_queue+0x1c/0x40\n [ 584.541884] fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc]\n [ 584.573823] process_one_work+0x1e3/0x3b0\n [ 584.592396] worker_thread+0x50/0x3b0\n [ 584.609256] ? rescuer_thread+0x370/0x370\n [ 584.628877] kthread+0x149/0x170\n [ 584.643673] ? set_kthread_struct+0x40/0x40\n [ 584.662909] ret_from_fork+0x22/0x30\n [ 584.680002] ---[ end trace 53575ecefa942ece ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48758",
"url": "https://www.suse.com/security/cve/CVE-2022-48758"
},
{
"category": "external",
"summary": "SUSE Bug 1226708 for CVE-2022-48758",
"url": "https://bugzilla.suse.com/1226708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48758"
},
{
"cve": "CVE-2022-48759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48759"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev\n\nstruct rpmsg_ctrldev contains a struct cdev. The current code frees\nthe rpmsg_ctrldev struct in rpmsg_ctrldev_release_device(), but the\ncdev is a managed object, therefore its release is not predictable\nand the rpmsg_ctrldev could be freed before the cdev is entirely\nreleased, as in the backtrace below.\n\n[ 93.625603] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x7c\n[ 93.636115] WARNING: CPU: 0 PID: 12 at lib/debugobjects.c:488 debug_print_object+0x13c/0x1b0\n[ 93.644799] Modules linked in: veth xt_cgroup xt_MASQUERADE rfcomm algif_hash algif_skcipher af_alg uinput ip6table_nat fuse uvcvideo videobuf2_vmalloc venus_enc venus_dec videobuf2_dma_contig hci_uart btandroid btqca snd_soc_rt5682_i2c bluetooth qcom_spmi_temp_alarm snd_soc_rt5682v\n[ 93.715175] CPU: 0 PID: 12 Comm: kworker/0:1 Tainted: G B 5.4.163-lockdep #26\n[ 93.723855] Hardware name: Google Lazor (rev3 - 8) with LTE (DT)\n[ 93.730055] Workqueue: events kobject_delayed_cleanup\n[ 93.735271] pstate: 60c00009 (nZCv daif +PAN +UAO)\n[ 93.740216] pc : debug_print_object+0x13c/0x1b0\n[ 93.744890] lr : debug_print_object+0x13c/0x1b0\n[ 93.749555] sp : ffffffacf5bc7940\n[ 93.752978] x29: ffffffacf5bc7940 x28: dfffffd000000000\n[ 93.758448] x27: ffffffacdb11a800 x26: dfffffd000000000\n[ 93.763916] x25: ffffffd0734f856c x24: dfffffd000000000\n[ 93.769389] x23: 0000000000000000 x22: ffffffd0733c35b0\n[ 93.774860] x21: ffffffd0751994a0 x20: ffffffd075ec27c0\n[ 93.780338] x19: ffffffd075199100 x18: 00000000000276e0\n[ 93.785814] x17: 0000000000000000 x16: dfffffd000000000\n[ 93.791291] x15: ffffffffffffffff x14: 6e6968207473696c\n[ 93.796768] x13: 0000000000000000 x12: ffffffd075e2b000\n[ 93.802244] x11: 0000000000000001 x10: 0000000000000000\n[ 93.807723] x9 : d13400dff1921900 x8 : d13400dff1921900\n[ 93.813200] x7 : 0000000000000000 x6 : 0000000000000000\n[ 93.818676] x5 : 0000000000000080 x4 : 0000000000000000\n[ 93.824152] x3 : ffffffd0732a0fa4 x2 : 0000000000000001\n[ 93.829628] x1 : ffffffacf5bc7580 x0 : 0000000000000061\n[ 93.835104] Call trace:\n[ 93.837644] debug_print_object+0x13c/0x1b0\n[ 93.841963] __debug_check_no_obj_freed+0x25c/0x3c0\n[ 93.846987] debug_check_no_obj_freed+0x18/0x20\n[ 93.851669] slab_free_freelist_hook+0xbc/0x1e4\n[ 93.856346] kfree+0xfc/0x2f4\n[ 93.859416] rpmsg_ctrldev_release_device+0x78/0xb8\n[ 93.864445] device_release+0x84/0x168\n[ 93.868310] kobject_cleanup+0x12c/0x298\n[ 93.872356] kobject_delayed_cleanup+0x10/0x18\n[ 93.876948] process_one_work+0x578/0x92c\n[ 93.881086] worker_thread+0x804/0xcf8\n[ 93.884963] kthread+0x2a8/0x314\n[ 93.888303] ret_from_fork+0x10/0x18\n\nThe cdev_device_add/del() API was created to address this issue (see\ncommit \u0027233ed09d7fda (\"chardev: add helper function to register char\ndevs with a struct device\")\u0027), use it instead of cdev add/del().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48759",
"url": "https://www.suse.com/security/cve/CVE-2022-48759"
},
{
"category": "external",
"summary": "SUSE Bug 1226711 for CVE-2022-48759",
"url": "https://bugzilla.suse.com/1226711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48759"
},
{
"cve": "CVE-2022-48760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48760"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix hang in usb_kill_urb by adding memory barriers\n\nThe syzbot fuzzer has identified a bug in which processes hang waiting\nfor usb_kill_urb() to return. It turns out the issue is not unlinking\nthe URB; that works just fine. Rather, the problem arises when the\nwakeup notification that the URB has completed is not received.\n\nThe reason is memory-access ordering on SMP systems. In outline form,\nusb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on\ndifferent CPUs perform the following actions:\n\nCPU 0\t\t\t\t\tCPU 1\n----------------------------\t\t---------------------------------\nusb_kill_urb():\t\t\t\t__usb_hcd_giveback_urb():\n ...\t\t\t\t\t ...\n atomic_inc(\u0026urb-\u003ereject);\t\t atomic_dec(\u0026urb-\u003euse_count);\n ...\t\t\t\t\t ...\n wait_event(usb_kill_urb_queue,\n\tatomic_read(\u0026urb-\u003euse_count) == 0);\n\t\t\t\t\t if (atomic_read(\u0026urb-\u003ereject))\n\t\t\t\t\t\twake_up(\u0026usb_kill_urb_queue);\n\nConfining your attention to urb-\u003ereject and urb-\u003euse_count, you can\nsee that the overall pattern of accesses on CPU 0 is:\n\n\twrite urb-\u003ereject, then read urb-\u003euse_count;\n\nwhereas the overall pattern of accesses on CPU 1 is:\n\n\twrite urb-\u003euse_count, then read urb-\u003ereject.\n\nThis pattern is referred to in memory-model circles as SB (for \"Store\nBuffering\"), and it is well known that without suitable enforcement of\nthe desired order of accesses -- in the form of memory barriers -- it\nis entirely possible for one or both CPUs to execute their reads ahead\nof their writes. The end result will be that sometimes CPU 0 sees the\nold un-decremented value of urb-\u003euse_count while CPU 1 sees the old\nun-incremented value of urb-\u003ereject. Consequently CPU 0 ends up on\nthe wait queue and never gets woken up, leading to the observed hang\nin usb_kill_urb().\n\nThe same pattern of accesses occurs in usb_poison_urb() and the\nfailure pathway of usb_hcd_submit_urb().\n\nThe problem is fixed by adding suitable memory barriers. To provide\nproper memory-access ordering in the SB pattern, a full barrier is\nrequired on both CPUs. The atomic_inc() and atomic_dec() accesses\nthemselves don\u0027t provide any memory ordering, but since they are\npresent, we can use the optimized smp_mb__after_atomic() memory\nbarrier in the various routines to obtain the desired effect.\n\nThis patch adds the necessary memory barriers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48760",
"url": "https://www.suse.com/security/cve/CVE-2022-48760"
},
{
"category": "external",
"summary": "SUSE Bug 1226712 for CVE-2022-48760",
"url": "https://bugzilla.suse.com/1226712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48760"
},
{
"cve": "CVE-2022-48767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48767"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: properly put ceph_string reference after async create attempt\n\nThe reference acquired by try_prep_async_create is currently leaked.\nEnsure we put it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48767",
"url": "https://www.suse.com/security/cve/CVE-2022-48767"
},
{
"category": "external",
"summary": "SUSE Bug 1226715 for CVE-2022-48767",
"url": "https://bugzilla.suse.com/1226715"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48767"
},
{
"cve": "CVE-2022-48768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48768"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/histogram: Fix a potential memory leak for kstrdup()\n\nkfree() is missing on an error path to free the memory allocated by\nkstrdup():\n\n p = param = kstrdup(data-\u003eparams[i], GFP_KERNEL);\n\nSo it is better to free it via kfree(p).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48768",
"url": "https://www.suse.com/security/cve/CVE-2022-48768"
},
{
"category": "external",
"summary": "SUSE Bug 1226720 for CVE-2022-48768",
"url": "https://bugzilla.suse.com/1226720"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48768"
},
{
"cve": "CVE-2022-48771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48771"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix stale file descriptors on failed usercopy\n\nA failing usercopy of the fence_rep object will lead to a stale entry in\nthe file descriptor table as put_unused_fd() won\u0027t release it. This\nenables userland to refer to a dangling \u0027file\u0027 object through that still\nvalid file descriptor, leading to all kinds of use-after-free\nexploitation scenarios.\n\nFix this by deferring the call to fd_install() until after the usercopy\nhas succeeded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48771",
"url": "https://www.suse.com/security/cve/CVE-2022-48771"
},
{
"category": "external",
"summary": "SUSE Bug 1226732 for CVE-2022-48771",
"url": "https://bugzilla.suse.com/1226732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2022-48771"
},
{
"cve": "CVE-2023-24023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-24023"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-24023",
"url": "https://www.suse.com/security/cve/CVE-2023-24023"
},
{
"category": "external",
"summary": "SUSE Bug 1218148 for CVE-2023-24023",
"url": "https://bugzilla.suse.com/1218148"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2023-52707",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52707"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/psi: Fix use-after-free in ep_remove_wait_queue()\n\nIf a non-root cgroup gets removed when there is a thread that registered\ntrigger and is polling on a pressure file within the cgroup, the polling\nwaitqueue gets freed in the following path:\n\n do_rmdir\n cgroup_rmdir\n kernfs_drain_open_files\n cgroup_file_release\n cgroup_pressure_release\n psi_trigger_destroy\n\nHowever, the polling thread still has a reference to the pressure file and\nwill access the freed waitqueue when the file is closed or upon exit:\n\n fput\n ep_eventpoll_release\n ep_free\n ep_remove_wait_queue\n remove_wait_queue\n\nThis results in use-after-free as pasted below.\n\nThe fundamental problem here is that cgroup_file_release() (and\nconsequently waitqueue\u0027s lifetime) is not tied to the file\u0027s real lifetime.\nUsing wake_up_pollfree() here might be less than ideal, but it is in line\nwith the comment at commit 42288cb44c4b (\"wait: add wake_up_pollfree()\")\nsince the waitqueue\u0027s lifetime is not tied to file\u0027s one and can be\nconsidered as another special case. While this would be fixable by somehow\nmaking cgroup_file_release() be tied to the fput(), it would require\nsizable refactoring at cgroups or higher layer which might be more\njustifiable if we identify more cases like this.\n\n BUG: KASAN: use-after-free in _raw_spin_lock_irqsave+0x60/0xc0\n Write of size 4 at addr ffff88810e625328 by task a.out/4404\n\n\tCPU: 19 PID: 4404 Comm: a.out Not tainted 6.2.0-rc6 #38\n\tHardware name: Amazon EC2 c5a.8xlarge/, BIOS 1.0 10/16/2017\n\tCall Trace:\n\t\u003cTASK\u003e\n\tdump_stack_lvl+0x73/0xa0\n\tprint_report+0x16c/0x4e0\n\tkasan_report+0xc3/0xf0\n\tkasan_check_range+0x2d2/0x310\n\t_raw_spin_lock_irqsave+0x60/0xc0\n\tremove_wait_queue+0x1a/0xa0\n\tep_free+0x12c/0x170\n\tep_eventpoll_release+0x26/0x30\n\t__fput+0x202/0x400\n\ttask_work_run+0x11d/0x170\n\tdo_exit+0x495/0x1130\n\tdo_group_exit+0x100/0x100\n\tget_signal+0xd67/0xde0\n\tarch_do_signal_or_restart+0x2a/0x2b0\n\texit_to_user_mode_prepare+0x94/0x100\n\tsyscall_exit_to_user_mode+0x20/0x40\n\tdo_syscall_64+0x52/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\t\u003c/TASK\u003e\n\n Allocated by task 4404:\n\n\tkasan_set_track+0x3d/0x60\n\t__kasan_kmalloc+0x85/0x90\n\tpsi_trigger_create+0x113/0x3e0\n\tpressure_write+0x146/0x2e0\n\tcgroup_file_write+0x11c/0x250\n\tkernfs_fop_write_iter+0x186/0x220\n\tvfs_write+0x3d8/0x5c0\n\tksys_write+0x90/0x110\n\tdo_syscall_64+0x43/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd\n\n Freed by task 4407:\n\n\tkasan_set_track+0x3d/0x60\n\tkasan_save_free_info+0x27/0x40\n\t____kasan_slab_free+0x11d/0x170\n\tslab_free_freelist_hook+0x87/0x150\n\t__kmem_cache_free+0xcb/0x180\n\tpsi_trigger_destroy+0x2e8/0x310\n\tcgroup_file_release+0x4f/0xb0\n\tkernfs_drain_open_files+0x165/0x1f0\n\tkernfs_drain+0x162/0x1a0\n\t__kernfs_remove+0x1fb/0x310\n\tkernfs_remove_by_name_ns+0x95/0xe0\n\tcgroup_addrm_files+0x67f/0x700\n\tcgroup_destroy_locked+0x283/0x3c0\n\tcgroup_rmdir+0x29/0x100\n\tkernfs_iop_rmdir+0xd1/0x140\n\tvfs_rmdir+0xfe/0x240\n\tdo_rmdir+0x13d/0x280\n\t__x64_sys_rmdir+0x2c/0x30\n\tdo_syscall_64+0x43/0x90\n\tentry_SYSCALL_64_after_hwframe+0x63/0xcd",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52707",
"url": "https://www.suse.com/security/cve/CVE-2023-52707"
},
{
"category": "external",
"summary": "SUSE Bug 1225109 for CVE-2023-52707",
"url": "https://bugzilla.suse.com/1225109"
},
{
"category": "external",
"summary": "SUSE Bug 1225190 for CVE-2023-52707",
"url": "https://bugzilla.suse.com/1225190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2023-52707"
},
{
"cve": "CVE-2023-52752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free bug in cifs_debug_data_proc_show()\n\nSkip SMB sessions that are being teared down\n(e.g. @ses-\u003eses_status == SES_EXITING) in cifs_debug_data_proc_show()\nto avoid use-after-free in @ses.\n\nThis fixes the following GPF when reading from /proc/fs/cifs/DebugData\nwhile mounting and umounting\n\n [ 816.251274] general protection fault, probably for non-canonical\n address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI\n ...\n [ 816.260138] Call Trace:\n [ 816.260329] \u003cTASK\u003e\n [ 816.260499] ? die_addr+0x36/0x90\n [ 816.260762] ? exc_general_protection+0x1b3/0x410\n [ 816.261126] ? asm_exc_general_protection+0x26/0x30\n [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs]\n [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs]\n [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs]\n [ 816.262689] ? seq_read_iter+0x379/0x470\n [ 816.262995] seq_read_iter+0x118/0x470\n [ 816.263291] proc_reg_read_iter+0x53/0x90\n [ 816.263596] ? srso_alias_return_thunk+0x5/0x7f\n [ 816.263945] vfs_read+0x201/0x350\n [ 816.264211] ksys_read+0x75/0x100\n [ 816.264472] do_syscall_64+0x3f/0x90\n [ 816.264750] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n [ 816.265135] RIP: 0033:0x7fd5e669d381",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52752",
"url": "https://www.suse.com/security/cve/CVE-2023-52752"
},
{
"category": "external",
"summary": "SUSE Bug 1225487 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "external",
"summary": "SUSE Bug 1225819 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2023-52752"
},
{
"cve": "CVE-2023-52881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52881"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: do not accept ACK of bytes we never sent\n\nThis patch is based on a detailed report and ideas from Yepeng Pan\nand Christian Rossow.\n\nACK seq validation is currently following RFC 5961 5.2 guidelines:\n\n The ACK value is considered acceptable only if\n it is in the range of ((SND.UNA - MAX.SND.WND) \u003c= SEG.ACK \u003c=\n SND.NXT). All incoming segments whose ACK value doesn\u0027t satisfy the\n above condition MUST be discarded and an ACK sent back. It needs to\n be noted that RFC 793 on page 72 (fifth check) says: \"If the ACK is a\n duplicate (SEG.ACK \u003c SND.UNA), it can be ignored. If the ACK\n acknowledges something not yet sent (SEG.ACK \u003e SND.NXT) then send an\n ACK, drop the segment, and return\". The \"ignored\" above implies that\n the processing of the incoming data segment continues, which means\n the ACK value is treated as acceptable. This mitigation makes the\n ACK check more stringent since any ACK \u003c SND.UNA wouldn\u0027t be\n accepted, instead only ACKs that are in the range ((SND.UNA -\n MAX.SND.WND) \u003c= SEG.ACK \u003c= SND.NXT) get through.\n\nThis can be refined for new (and possibly spoofed) flows,\nby not accepting ACK for bytes that were never sent.\n\nThis greatly improves TCP security at a little cost.\n\nI added a Fixes: tag to make sure this patch will reach stable trees,\neven if the \u0027blamed\u0027 patch was adhering to the RFC.\n\ntp-\u003ebytes_acked was added in linux-4.2\n\nFollowing packetdrill test (courtesy of Yepeng Pan) shows\nthe issue at hand:\n\n0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3\n+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0\n+0 bind(3, ..., ...) = 0\n+0 listen(3, 1024) = 0\n\n// ---------------- Handshake ------------------- //\n\n// when window scale is set to 14 the window size can be extended to\n// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet\n// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)\n// ,though this ack number acknowledges some data never\n// sent by the server.\n\n+0 \u003c S 0:0(0) win 65535 \u003cmss 1400,nop,wscale 14\u003e\n+0 \u003e S. 0:0(0) ack 1 \u003c...\u003e\n+0 \u003c . 1:1(0) ack 1 win 65535\n+0 accept(3, ..., ...) = 4\n\n// For the established connection, we send an ACK packet,\n// the ack packet uses ack number 1 - 1073725300 + 2^32,\n// where 2^32 is used to wrap around.\n// Note: we used 1073725300 instead of 1073725440 to avoid possible\n// edge cases.\n// 1 - 1073725300 + 2^32 = 3221241997\n\n// Oops, old kernels happily accept this packet.\n+0 \u003c . 1:1001(1000) ack 3221241997 win 65535\n\n// After the kernel fix the following will be replaced by a challenge ACK,\n// and prior malicious frame would be dropped.\n+0 \u003e . 1:1(0) ack 1001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52881",
"url": "https://www.suse.com/security/cve/CVE-2023-52881"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1225611 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "external",
"summary": "SUSE Bug 1226152 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1226152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2023-52881"
},
{
"cve": "CVE-2024-26822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: set correct id, uid and cruid for multiuser automounts\n\nWhen uid, gid and cruid are not specified, we need to dynamically\nset them into the filesystem context used for automounting otherwise\nthey\u0027ll end up reusing the values from the parent mount.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26822",
"url": "https://www.suse.com/security/cve/CVE-2024-26822"
},
{
"category": "external",
"summary": "SUSE Bug 1223011 for CVE-2024-26822",
"url": "https://bugzilla.suse.com/1223011"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-26822"
},
{
"cve": "CVE-2024-35789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35789"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes\n\nWhen moving a station out of a VLAN and deleting the VLAN afterwards, the\nfast_rx entry still holds a pointer to the VLAN\u0027s netdev, which can cause\nuse-after-free bugs. Fix this by immediately calling ieee80211_check_fast_rx\nafter the VLAN change.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35789",
"url": "https://www.suse.com/security/cve/CVE-2024-35789"
},
{
"category": "external",
"summary": "SUSE Bug 1224749 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1224749"
},
{
"category": "external",
"summary": "SUSE Bug 1227320 for CVE-2024-35789",
"url": "https://bugzilla.suse.com/1227320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35861",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35861"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_signal_cifsd_for_reconnect()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35861",
"url": "https://www.suse.com/security/cve/CVE-2024-35861"
},
{
"category": "external",
"summary": "SUSE Bug 1224766 for CVE-2024-35861",
"url": "https://bugzilla.suse.com/1224766"
},
{
"category": "external",
"summary": "SUSE Bug 1225312 for CVE-2024-35861",
"url": "https://bugzilla.suse.com/1225312"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2024-35861"
},
{
"cve": "CVE-2024-35862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35862"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_network_name_deleted()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35862",
"url": "https://www.suse.com/security/cve/CVE-2024-35862"
},
{
"category": "external",
"summary": "SUSE Bug 1224764 for CVE-2024-35862",
"url": "https://bugzilla.suse.com/1224764"
},
{
"category": "external",
"summary": "SUSE Bug 1225311 for CVE-2024-35862",
"url": "https://bugzilla.suse.com/1225311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2024-35862"
},
{
"cve": "CVE-2024-35864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35864"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_valid_lease_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35864",
"url": "https://www.suse.com/security/cve/CVE-2024-35864"
},
{
"category": "external",
"summary": "SUSE Bug 1224765 for CVE-2024-35864",
"url": "https://bugzilla.suse.com/1224765"
},
{
"category": "external",
"summary": "SUSE Bug 1225309 for CVE-2024-35864",
"url": "https://bugzilla.suse.com/1225309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2024-35864"
},
{
"cve": "CVE-2024-35878",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35878"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: prevent NULL pointer dereference in vsnprintf()\n\nIn of_modalias(), we can get passed the str and len parameters which would\ncause a kernel oops in vsnprintf() since it only allows passing a NULL ptr\nwhen the length is also 0. Also, we need to filter out the negative values\nof the len parameter as these will result in a really huge buffer since\nsnprintf() takes size_t parameter while ours is ssize_t...\n\nFound by Linux Verification Center (linuxtesting.org) with the Svace static\nanalysis tool.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35878",
"url": "https://www.suse.com/security/cve/CVE-2024-35878"
},
{
"category": "external",
"summary": "SUSE Bug 1224671 for CVE-2024-35878",
"url": "https://bugzilla.suse.com/1224671"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-35878"
},
{
"cve": "CVE-2024-35950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35950"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fully protect modes[] with dev-\u003emode_config.mutex\n\nThe modes[] array contains pointers to modes on the connectors\u0027\nmode lists, which are protected by dev-\u003emode_config.mutex.\nThus we need to extend modes[] the same protection or by the\ntime we use it the elements may already be pointing to\nfreed/reused memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35950",
"url": "https://www.suse.com/security/cve/CVE-2024-35950"
},
{
"category": "external",
"summary": "SUSE Bug 1224703 for CVE-2024-35950",
"url": "https://bugzilla.suse.com/1224703"
},
{
"category": "external",
"summary": "SUSE Bug 1225310 for CVE-2024-35950",
"url": "https://bugzilla.suse.com/1225310"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-35950"
},
{
"cve": "CVE-2024-36894",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36894"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete\n\nFFS based applications can utilize the aio_cancel() callback to dequeue\npending USB requests submitted to the UDC. There is a scenario where the\nFFS application issues an AIO cancel call, while the UDC is handling a\nsoft disconnect. For a DWC3 based implementation, the callstack looks\nlike the following:\n\n DWC3 Gadget FFS Application\ndwc3_gadget_soft_disconnect() ...\n --\u003e dwc3_stop_active_transfers()\n --\u003e dwc3_gadget_giveback(-ESHUTDOWN)\n --\u003e ffs_epfile_async_io_complete() ffs_aio_cancel()\n --\u003e usb_ep_free_request() --\u003e usb_ep_dequeue()\n\nThere is currently no locking implemented between the AIO completion\nhandler and AIO cancel, so the issue occurs if the completion routine is\nrunning in parallel to an AIO cancel call coming from the FFS application.\nAs the completion call frees the USB request (io_data-\u003ereq) the FFS\napplication is also referencing it for the usb_ep_dequeue() call. This can\nlead to accessing a stale/hanging pointer.\n\ncommit b566d38857fc (\"usb: gadget: f_fs: use io_data-\u003estatus consistently\")\nrelocated the usb_ep_free_request() into ffs_epfile_async_io_complete().\nHowever, in order to properly implement locking to mitigate this issue, the\nspinlock can\u0027t be added to ffs_epfile_async_io_complete(), as\nusb_ep_dequeue() (if successfully dequeuing a USB request) will call the\nfunction driver\u0027s completion handler in the same context. Hence, leading\ninto a deadlock.\n\nFix this issue by moving the usb_ep_free_request() back to\nffs_user_copy_worker(), and ensuring that it explicitly sets io_data-\u003ereq\nto NULL after freeing it within the ffs-\u003eeps_lock. This resolves the race\ncondition above, as the ffs_aio_cancel() routine will not continue\nattempting to dequeue a request that has already been freed, or the\nffs_user_copy_work() not freeing the USB request until the AIO cancel is\ndone referencing it.\n\nThis fix depends on\n commit b566d38857fc (\"usb: gadget: f_fs: use io_data-\u003estatus\n consistently\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36894",
"url": "https://www.suse.com/security/cve/CVE-2024-36894"
},
{
"category": "external",
"summary": "SUSE Bug 1225749 for CVE-2024-36894",
"url": "https://bugzilla.suse.com/1225749"
},
{
"category": "external",
"summary": "SUSE Bug 1226139 for CVE-2024-36894",
"url": "https://bugzilla.suse.com/1226139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-36894"
},
{
"cve": "CVE-2024-36904",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36904"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: Use refcount_inc_not_zero() in tcp_twsk_unique().\n\nAnderson Nascimento reported a use-after-free splat in tcp_twsk_unique()\nwith nice analysis.\n\nSince commit ec94c2696f0b (\"tcp/dccp: avoid one atomic operation for\ntimewait hashdance\"), inet_twsk_hashdance() sets TIME-WAIT socket\u0027s\nsk_refcnt after putting it into ehash and releasing the bucket lock.\n\nThus, there is a small race window where other threads could try to\nreuse the port during connect() and call sock_hold() in tcp_twsk_unique()\nfor the TIME-WAIT socket with zero refcnt.\n\nIf that happens, the refcnt taken by tcp_twsk_unique() is overwritten\nand sock_put() will cause underflow, triggering a real use-after-free\nsomewhere else.\n\nTo avoid the use-after-free, we need to use refcount_inc_not_zero() in\ntcp_twsk_unique() and give up on reusing the port if it returns false.\n\n[0]:\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 0 PID: 1039313 at lib/refcount.c:25 refcount_warn_saturate+0xe5/0x110\nCPU: 0 PID: 1039313 Comm: trigger Not tainted 6.8.6-200.fc39.x86_64 #1\nHardware name: VMware, Inc. VMware20,1/440BX Desktop Reference Platform, BIOS VMW201.00V.21805430.B64.2305221830 05/22/2023\nRIP: 0010:refcount_warn_saturate+0xe5/0x110\nCode: 42 8e ff 0f 0b c3 cc cc cc cc 80 3d aa 13 ea 01 00 0f 85 5e ff ff ff 48 c7 c7 f8 8e b7 82 c6 05 96 13 ea 01 01 e8 7b 42 8e ff \u003c0f\u003e 0b c3 cc cc cc cc 48 c7 c7 50 8f b7 82 c6 05 7a 13 ea 01 01 e8\nRSP: 0018:ffffc90006b43b60 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff888009bb3ef0 RCX: 0000000000000027\nRDX: ffff88807be218c8 RSI: 0000000000000001 RDI: ffff88807be218c0\nRBP: 0000000000069d70 R08: 0000000000000000 R09: ffffc90006b439f0\nR10: ffffc90006b439e8 R11: 0000000000000003 R12: ffff8880029ede84\nR13: 0000000000004e20 R14: ffffffff84356dc0 R15: ffff888009bb3ef0\nFS: 00007f62c10926c0(0000) GS:ffff88807be00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020ccb000 CR3: 000000004628c005 CR4: 0000000000f70ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? refcount_warn_saturate+0xe5/0x110\n ? __warn+0x81/0x130\n ? refcount_warn_saturate+0xe5/0x110\n ? report_bug+0x171/0x1a0\n ? refcount_warn_saturate+0xe5/0x110\n ? handle_bug+0x3c/0x80\n ? exc_invalid_op+0x17/0x70\n ? asm_exc_invalid_op+0x1a/0x20\n ? refcount_warn_saturate+0xe5/0x110\n tcp_twsk_unique+0x186/0x190\n __inet_check_established+0x176/0x2d0\n __inet_hash_connect+0x74/0x7d0\n ? __pfx___inet_check_established+0x10/0x10\n tcp_v4_connect+0x278/0x530\n __inet_stream_connect+0x10f/0x3d0\n inet_stream_connect+0x3a/0x60\n __sys_connect+0xa8/0xd0\n __x64_sys_connect+0x18/0x20\n do_syscall_64+0x83/0x170\n entry_SYSCALL_64_after_hwframe+0x78/0x80\nRIP: 0033:0x7f62c11a885d\nCode: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 8b 0d a3 45 0c 00 f7 d8 64 89 01 48\nRSP: 002b:00007f62c1091e58 EFLAGS: 00000296 ORIG_RAX: 000000000000002a\nRAX: ffffffffffffffda RBX: 0000000020ccb004 RCX: 00007f62c11a885d\nRDX: 0000000000000010 RSI: 0000000020ccb000 RDI: 0000000000000003\nRBP: 00007f62c1091e90 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000296 R12: 00007f62c10926c0\nR13: ffffffffffffff88 R14: 0000000000000000 R15: 00007ffe237885b0\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36904",
"url": "https://www.suse.com/security/cve/CVE-2024-36904"
},
{
"category": "external",
"summary": "SUSE Bug 1225732 for CVE-2024-36904",
"url": "https://bugzilla.suse.com/1225732"
},
{
"category": "external",
"summary": "SUSE Bug 1225733 for CVE-2024-36904",
"url": "https://bugzilla.suse.com/1225733"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-36904"
},
{
"cve": "CVE-2024-36940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36940"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: core: delete incorrect free in pinctrl_enable()\n\nThe \"pctldev\" struct is allocated in devm_pinctrl_register_and_init().\nIt\u0027s a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),\nso freeing it in pinctrl_enable() will lead to a double free.\n\nThe devm_pinctrl_dev_release() function frees the pindescs and destroys\nthe mutex as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36940",
"url": "https://www.suse.com/security/cve/CVE-2024-36940"
},
{
"category": "external",
"summary": "SUSE Bug 1225840 for CVE-2024-36940",
"url": "https://bugzilla.suse.com/1225840"
},
{
"category": "external",
"summary": "SUSE Bug 1225841 for CVE-2024-36940",
"url": "https://bugzilla.suse.com/1225841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000\u0027s perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36964",
"url": "https://www.suse.com/security/cve/CVE-2024-36964"
},
{
"category": "external",
"summary": "SUSE Bug 1225866 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "external",
"summary": "SUSE Bug 1226325 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1226325"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "important"
}
],
"title": "CVE-2024-36964"
},
{
"cve": "CVE-2024-38541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38541"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nof: module: add buffer overflow check in of_modalias()\n\nIn of_modalias(), if the buffer happens to be too small even for the 1st\nsnprintf() call, the len parameter will become negative and str parameter\n(if not NULL initially) will point beyond the buffer\u0027s end. Add the buffer\noverflow check after the 1st snprintf() call and fix such check after the\nstrlen() call (accounting for the terminating NUL char).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38541",
"url": "https://www.suse.com/security/cve/CVE-2024-38541"
},
{
"category": "external",
"summary": "SUSE Bug 1226587 for CVE-2024-38541",
"url": "https://bugzilla.suse.com/1226587"
},
{
"category": "external",
"summary": "SUSE Bug 1227496 for CVE-2024-38541",
"url": "https://bugzilla.suse.com/1227496"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-38541"
},
{
"cve": "CVE-2024-38545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38545"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix UAF for cq async event\n\nThe refcount of CQ is not protected by locks. When CQ asynchronous\nevents and CQ destruction are concurrent, CQ may have been released,\nwhich will cause UAF.\n\nUse the xa_lock() to protect the CQ refcount.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38545",
"url": "https://www.suse.com/security/cve/CVE-2024-38545"
},
{
"category": "external",
"summary": "SUSE Bug 1226595 for CVE-2024-38545",
"url": "https://bugzilla.suse.com/1226595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-38545"
},
{
"cve": "CVE-2024-38559",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38559"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a count-sized kernel buffer and copy count from\nuserspace to that buffer. Later, we use kstrtouint on this buffer but we\ndon\u0027t ensure that the string is terminated inside the buffer, this can\nlead to OOB read when using kstrtouint. Fix this issue by using\nmemdup_user_nul instead of memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38559",
"url": "https://www.suse.com/security/cve/CVE-2024-38559"
},
{
"category": "external",
"summary": "SUSE Bug 1226785 for CVE-2024-38559",
"url": "https://bugzilla.suse.com/1226785"
},
{
"category": "external",
"summary": "SUSE Bug 1227495 for CVE-2024-38559",
"url": "https://bugzilla.suse.com/1227495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-38559"
},
{
"cve": "CVE-2024-38560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38560"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bfa: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a nbytes-sized kernel buffer and copy nbytes from\nuserspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t\nensure that the string is terminated inside the buffer, this can lead to\nOOB read when using sscanf. Fix this issue by using memdup_user_nul instead\nof memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38560",
"url": "https://www.suse.com/security/cve/CVE-2024-38560"
},
{
"category": "external",
"summary": "SUSE Bug 1226786 for CVE-2024-38560",
"url": "https://bugzilla.suse.com/1226786"
},
{
"category": "external",
"summary": "SUSE Bug 1227319 for CVE-2024-38560",
"url": "https://bugzilla.suse.com/1227319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.1:kernel-source-rt-5.3.18-150300.175.1.noarch",
"SUSE Linux Enterprise Micro 5.2:kernel-rt-5.3.18-150300.175.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:kernel-source-rt-5.3.18-150300.175.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-10T12:03:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-38560"
}
]
}
suse-su-2021:3929-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2017-5753: Systems with microprocessors utilizing speculative execution and branch prediction may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bnc#1068032). Additional spectrev1 fixes were added to the eBPF code.\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1087082 bnc#1100416 bnc#1129735).\n- CVE-2018-16882: A use-after-free issue was found in the way the KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the \u0027pi_desc_page\u0027 without resetting \u0027pi_desc\u0027 descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions and are vulnerable (bnc#1119934).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).\n- CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767 (bnc#1171217).\n- CVE-2020-14305: An out-of-bounds memory write flaw was found in how the Linux kernel\u0026#8217;s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allowed an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1173346).\n- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).\n- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).\n- CVE-2021-34556: In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).\n- CVE-2021-35477: In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2021-3653: A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \u0027int_ctl\u0027 field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. (bnc#1189399).\n- CVE-2021-3655: A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-3679: A lack of CPU resource in the tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel\u0027s bluetooth module. (bsc#1190023)\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838 bnc#1190276).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computed the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).\n- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159)\n- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).\n- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).\n- CVE-2021-43389: An issue was discovered in the Linux kernel There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- - ipv4: make exception cache less predictible (bsc#1191790, CVE-2021-20322).\n\nThe following non-security bugs were fixed:\n\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22918).\n- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).\n- btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1188325).\n- btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1188325).\n- btrfs: relocation: fix reloc_root lifespan and access (bsc#1188325).\n- config: disable unprivileged BPF by default (jsc#SLE-22918) Backport of mainline commit 8a03e56b253e (\u0027bpf: Disallow unprivileged bpf by default\u0027) only changes kconfig default, used e.g. for \u0027make oldconfig\u0027 when the config option is missing, but does not update our kernel configs used for build. Update also these to make sure unprivileged BPF is really disabled by default.\n- kABI: protect struct bpf_map (kabi).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).\n- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).\n- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).\n- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).\n- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).\n- scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- sctp: fully initialize v4 addr in some functions (bsc#1188563).\n- sctp: simplify addr copy (bsc#1188563).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3929,SUSE-SLE-SERVER-12-SP2-BCL-2021-3929",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3929-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3929-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213929-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3929-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2021-December/020993.html"
},
{
"category": "self",
"summary": "SUSE Bug 1068032",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1098425",
"url": "https://bugzilla.suse.com/1098425"
},
{
"category": "self",
"summary": "SUSE Bug 1100416",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "self",
"summary": "SUSE Bug 1119934",
"url": "https://bugzilla.suse.com/1119934"
},
{
"category": "self",
"summary": "SUSE Bug 1129735",
"url": "https://bugzilla.suse.com/1129735"
},
{
"category": "self",
"summary": "SUSE Bug 1171217",
"url": "https://bugzilla.suse.com/1171217"
},
{
"category": "self",
"summary": "SUSE Bug 1171420",
"url": "https://bugzilla.suse.com/1171420"
},
{
"category": "self",
"summary": "SUSE Bug 1173346",
"url": "https://bugzilla.suse.com/1173346"
},
{
"category": "self",
"summary": "SUSE Bug 1176724",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "self",
"summary": "SUSE Bug 1183089",
"url": "https://bugzilla.suse.com/1183089"
},
{
"category": "self",
"summary": "SUSE Bug 1184673",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "self",
"summary": "SUSE Bug 1186109",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1188172",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "self",
"summary": "SUSE Bug 1188325",
"url": "https://bugzilla.suse.com/1188325"
},
{
"category": "self",
"summary": "SUSE Bug 1188563",
"url": "https://bugzilla.suse.com/1188563"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1188838",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "self",
"summary": "SUSE Bug 1188876",
"url": "https://bugzilla.suse.com/1188876"
},
{
"category": "self",
"summary": "SUSE Bug 1188983",
"url": "https://bugzilla.suse.com/1188983"
},
{
"category": "self",
"summary": "SUSE Bug 1188985",
"url": "https://bugzilla.suse.com/1188985"
},
{
"category": "self",
"summary": "SUSE Bug 1189057",
"url": "https://bugzilla.suse.com/1189057"
},
{
"category": "self",
"summary": "SUSE Bug 1189262",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "self",
"summary": "SUSE Bug 1189291",
"url": "https://bugzilla.suse.com/1189291"
},
{
"category": "self",
"summary": "SUSE Bug 1189399",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "self",
"summary": "SUSE Bug 1189706",
"url": "https://bugzilla.suse.com/1189706"
},
{
"category": "self",
"summary": "SUSE Bug 1190023",
"url": "https://bugzilla.suse.com/1190023"
},
{
"category": "self",
"summary": "SUSE Bug 1190025",
"url": "https://bugzilla.suse.com/1190025"
},
{
"category": "self",
"summary": "SUSE Bug 1190067",
"url": "https://bugzilla.suse.com/1190067"
},
{
"category": "self",
"summary": "SUSE Bug 1190117",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "self",
"summary": "SUSE Bug 1190159",
"url": "https://bugzilla.suse.com/1190159"
},
{
"category": "self",
"summary": "SUSE Bug 1190276",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "self",
"summary": "SUSE Bug 1190349",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "self",
"summary": "SUSE Bug 1190351",
"url": "https://bugzilla.suse.com/1190351"
},
{
"category": "self",
"summary": "SUSE Bug 1190601",
"url": "https://bugzilla.suse.com/1190601"
},
{
"category": "self",
"summary": "SUSE Bug 1191193",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "self",
"summary": "SUSE Bug 1191315",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE Bug 802154",
"url": "https://bugzilla.suse.com/802154"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-5753 page",
"url": "https://www.suse.com/security/cve/CVE-2017-5753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13405 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16882 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-0429 page",
"url": "https://www.suse.com/security/cve/CVE-2020-0429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12655 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14305 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-3702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-3702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33033 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34556 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35477 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3655 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3659 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3679 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3715 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3732 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3752 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3760 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3772 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38160 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38198 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38204 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3896 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-40490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-40490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42008 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-12-06T09:57:42Z",
"generator": {
"date": "2021-12-06T09:57:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3929-1",
"initial_release_date": "2021-12-06T09:57:42Z",
"revision_history": [
{
"date": "2021-12-06T09:57:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.161.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.161.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.161.1.aarch64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.161.1.aarch64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.161.1.aarch64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.161.1.aarch64",
"product_id": "cluster-network-kmp-default-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.161.1.aarch64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.161.1.aarch64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.161.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.161.1.aarch64",
"product_id": "dlm-kmp-default-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.161.1.aarch64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.161.1.aarch64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.161.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.161.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.161.1.aarch64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.161.1.aarch64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-default-4.4.121-92.161.1.aarch64",
"product_id": "kernel-default-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.121-92.161.1.aarch64",
"product_id": "kernel-default-base-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.121-92.161.1.aarch64",
"product_id": "kernel-default-devel-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.121-92.161.1.aarch64",
"product_id": "kernel-default-extra-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.161.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.121-92.161.1.aarch64",
"product_id": "kernel-obs-build-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.161.1.aarch64",
"product_id": "kernel-obs-qa-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-syms-4.4.121-92.161.1.aarch64",
"product_id": "kernel-syms-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.121-92.161.1.aarch64",
"product_id": "kernel-vanilla-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.161.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.161.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.161.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.161.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.161.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.121-92.161.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.161.1.aarch64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.161.1.aarch64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.161.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.121-92.161.1.noarch",
"product": {
"name": "kernel-devel-4.4.121-92.161.1.noarch",
"product_id": "kernel-devel-4.4.121-92.161.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.121-92.161.1.noarch",
"product": {
"name": "kernel-docs-4.4.121-92.161.1.noarch",
"product_id": "kernel-docs-4.4.121-92.161.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.121-92.161.1.noarch",
"product": {
"name": "kernel-docs-html-4.4.121-92.161.1.noarch",
"product_id": "kernel-docs-html-4.4.121-92.161.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.121-92.161.1.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.121-92.161.1.noarch",
"product_id": "kernel-docs-pdf-4.4.121-92.161.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.121-92.161.1.noarch",
"product": {
"name": "kernel-macros-4.4.121-92.161.1.noarch",
"product_id": "kernel-macros-4.4.121-92.161.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.121-92.161.1.noarch",
"product": {
"name": "kernel-source-4.4.121-92.161.1.noarch",
"product_id": "kernel-source-4.4.121-92.161.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.121-92.161.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.121-92.161.1.noarch",
"product_id": "kernel-source-vanilla-4.4.121-92.161.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.161.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.161.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.161.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.161.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.161.1.ppc64le",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.161.1.ppc64le",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.161.1.ppc64le",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.161.1.ppc64le",
"product_id": "cluster-network-kmp-debug-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.161.1.ppc64le",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.161.1.ppc64le",
"product_id": "cluster-network-kmp-default-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.161.1.ppc64le",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.161.1.ppc64le",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.161.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.161.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.161.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.121-92.161.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.161.1.ppc64le",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.161.1.ppc64le",
"product_id": "dlm-kmp-vanilla-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.161.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.161.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.161.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.161.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.161.1.ppc64le",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.161.1.ppc64le",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-debug-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-debug-base-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-default-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-default-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-default-base-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-default-devel-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-default-extra-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-obs-build-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-syms-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-vanilla-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.161.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.161.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.161.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.161.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.161.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.161.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.121-92.161.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.161.1.ppc64le",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.161.1.ppc64le",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.161.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.161.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.161.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.161.1.s390x",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.161.1.s390x",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.161.1.s390x",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.161.1.s390x",
"product_id": "cluster-network-kmp-default-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.161.1.s390x",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.161.1.s390x",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.161.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.121-92.161.1.s390x",
"product_id": "dlm-kmp-default-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.161.1.s390x",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.161.1.s390x",
"product_id": "dlm-kmp-vanilla-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.161.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.161.1.s390x",
"product_id": "gfs2-kmp-default-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.161.1.s390x",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.161.1.s390x",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-default-4.4.121-92.161.1.s390x",
"product_id": "kernel-default-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-default-base-4.4.121-92.161.1.s390x",
"product_id": "kernel-default-base-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.121-92.161.1.s390x",
"product_id": "kernel-default-devel-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.121-92.161.1.s390x",
"product_id": "kernel-default-extra-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.161.1.s390x",
"product_id": "kernel-default-kgraft-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-default-man-4.4.121-92.161.1.s390x",
"product_id": "kernel-default-man-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.121-92.161.1.s390x",
"product_id": "kernel-obs-build-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.121-92.161.1.s390x",
"product_id": "kernel-obs-qa-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-syms-4.4.121-92.161.1.s390x",
"product_id": "kernel-syms-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.121-92.161.1.s390x",
"product_id": "kernel-vanilla-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.161.1.s390x",
"product_id": "kernel-vanilla-base-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.161.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.121-92.161.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.121-92.161.1.s390x",
"product_id": "kernel-zfcpdump-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.161.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.161.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.121-92.161.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.161.1.s390x",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.161.1.s390x",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.161.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.121-92.161.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.121-92.161.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.121-92.161.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.121-92.161.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-vanilla-4.4.121-92.161.1.x86_64",
"product": {
"name": "cluster-md-kmp-vanilla-4.4.121-92.161.1.x86_64",
"product_id": "cluster-md-kmp-vanilla-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-debug-4.4.121-92.161.1.x86_64",
"product": {
"name": "cluster-network-kmp-debug-4.4.121-92.161.1.x86_64",
"product_id": "cluster-network-kmp-debug-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-default-4.4.121-92.161.1.x86_64",
"product": {
"name": "cluster-network-kmp-default-4.4.121-92.161.1.x86_64",
"product_id": "cluster-network-kmp-default-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-network-kmp-vanilla-4.4.121-92.161.1.x86_64",
"product": {
"name": "cluster-network-kmp-vanilla-4.4.121-92.161.1.x86_64",
"product_id": "cluster-network-kmp-vanilla-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.121-92.161.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.121-92.161.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.121-92.161.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.121-92.161.1.x86_64",
"product_id": "dlm-kmp-default-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-vanilla-4.4.121-92.161.1.x86_64",
"product": {
"name": "dlm-kmp-vanilla-4.4.121-92.161.1.x86_64",
"product_id": "dlm-kmp-vanilla-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.121-92.161.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.121-92.161.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.121-92.161.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.121-92.161.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-vanilla-4.4.121-92.161.1.x86_64",
"product": {
"name": "gfs2-kmp-vanilla-4.4.121-92.161.1.x86_64",
"product_id": "gfs2-kmp-vanilla-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-debug-4.4.121-92.161.1.x86_64",
"product_id": "kernel-debug-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.121-92.161.1.x86_64",
"product_id": "kernel-debug-base-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.121-92.161.1.x86_64",
"product_id": "kernel-debug-devel-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.121-92.161.1.x86_64",
"product_id": "kernel-debug-extra-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.121-92.161.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-default-4.4.121-92.161.1.x86_64",
"product_id": "kernel-default-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.121-92.161.1.x86_64",
"product_id": "kernel-default-base-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.121-92.161.1.x86_64",
"product_id": "kernel-default-devel-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.121-92.161.1.x86_64",
"product_id": "kernel-default-extra-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.121-92.161.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.121-92.161.1.x86_64",
"product_id": "kernel-obs-build-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.121-92.161.1.x86_64",
"product_id": "kernel-obs-qa-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-syms-4.4.121-92.161.1.x86_64",
"product_id": "kernel-syms-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.121-92.161.1.x86_64",
"product_id": "kernel-vanilla-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.121-92.161.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.121-92.161.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.121-92.161.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.121-92.161.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.121-92.161.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.121-92.161.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.121-92.161.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.121-92.161.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-vanilla-4.4.121-92.161.1.x86_64",
"product": {
"name": "ocfs2-kmp-vanilla-4.4.121-92.161.1.x86_64",
"product_id": "ocfs2-kmp-vanilla-4.4.121-92.161.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.121-92.161.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64"
},
"product_reference": "kernel-default-4.4.121-92.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.121-92.161.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.121-92.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.121-92.161.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.121-92.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.121-92.161.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch"
},
"product_reference": "kernel-devel-4.4.121-92.161.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.121-92.161.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch"
},
"product_reference": "kernel-macros-4.4.121-92.161.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.121-92.161.1.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch"
},
"product_reference": "kernel-source-4.4.121-92.161.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.121-92.161.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
},
"product_reference": "kernel-syms-4.4.121-92.161.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-5753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-5753"
}
],
"notes": [
{
"category": "general",
"text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-5753",
"url": "https://www.suse.com/security/cve/CVE-2017-5753"
},
{
"category": "external",
"summary": "SUSE Bug 1068032 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1068032"
},
{
"category": "external",
"summary": "SUSE Bug 1074562 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074562"
},
{
"category": "external",
"summary": "SUSE Bug 1074578 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074578"
},
{
"category": "external",
"summary": "SUSE Bug 1074701 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1074701"
},
{
"category": "external",
"summary": "SUSE Bug 1075006 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075006"
},
{
"category": "external",
"summary": "SUSE Bug 1075419 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075419"
},
{
"category": "external",
"summary": "SUSE Bug 1075748 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1075748"
},
{
"category": "external",
"summary": "SUSE Bug 1080039 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1080039"
},
{
"category": "external",
"summary": "SUSE Bug 1087084 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087084"
},
{
"category": "external",
"summary": "SUSE Bug 1087939 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1087939"
},
{
"category": "external",
"summary": "SUSE Bug 1089055 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1089055"
},
{
"category": "external",
"summary": "SUSE Bug 1136865 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1136865"
},
{
"category": "external",
"summary": "SUSE Bug 1178658 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1178658"
},
{
"category": "external",
"summary": "SUSE Bug 1201877 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1201877"
},
{
"category": "external",
"summary": "SUSE Bug 1209547 for CVE-2017-5753",
"url": "https://bugzilla.suse.com/1209547"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2017-5753"
},
{
"cve": "CVE-2018-13405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13405"
}
],
"notes": [
{
"category": "general",
"text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13405",
"url": "https://www.suse.com/security/cve/CVE-2018-13405"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1100416 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "external",
"summary": "SUSE Bug 1129735 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1129735"
},
{
"category": "external",
"summary": "SUSE Bug 1195161 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1195161"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2018-13405"
},
{
"cve": "CVE-2018-16882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16882"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free issue was found in the way the Linux kernel\u0027s KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the \u0027pi_desc_page\u0027 without resetting \u0027pi_desc\u0027 descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions before 4.14.91 and before 4.19.13 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16882",
"url": "https://www.suse.com/security/cve/CVE-2018-16882"
},
{
"category": "external",
"summary": "SUSE Bug 1119934 for CVE-2018-16882",
"url": "https://bugzilla.suse.com/1119934"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2018-16882"
},
{
"cve": "CVE-2020-0429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-0429"
}
],
"notes": [
{
"category": "general",
"text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-0429",
"url": "https://www.suse.com/security/cve/CVE-2020-0429"
},
{
"category": "external",
"summary": "SUSE Bug 1176724 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "external",
"summary": "SUSE Bug 1176931 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176931"
},
{
"category": "external",
"summary": "SUSE Bug 1188026 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1188026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2020-0429"
},
{
"cve": "CVE-2020-12655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12655"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12655",
"url": "https://www.suse.com/security/cve/CVE-2020-12655"
},
{
"category": "external",
"summary": "SUSE Bug 1171217 for CVE-2020-12655",
"url": "https://bugzilla.suse.com/1171217"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "low"
}
],
"title": "CVE-2020-12655"
},
{
"cve": "CVE-2020-14305",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14305"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u0027s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14305",
"url": "https://www.suse.com/security/cve/CVE-2020-14305"
},
{
"category": "external",
"summary": "SUSE Bug 1173346 for CVE-2020-14305",
"url": "https://bugzilla.suse.com/1173346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2020-14305"
},
{
"cve": "CVE-2020-3702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-3702"
}
],
"notes": [
{
"category": "general",
"text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-3702",
"url": "https://www.suse.com/security/cve/CVE-2020-3702"
},
{
"category": "external",
"summary": "SUSE Bug 1191193 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "external",
"summary": "SUSE Bug 1191529 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2020-3702"
},
{
"cve": "CVE-2021-20265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20265"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20265",
"url": "https://www.suse.com/security/cve/CVE-2021-20265"
},
{
"category": "external",
"summary": "SUSE Bug 1183089 for CVE-2021-20265",
"url": "https://bugzilla.suse.com/1183089"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-20265",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-20265",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-20265"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-33033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33033"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33033",
"url": "https://www.suse.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "SUSE Bug 1186109 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "external",
"summary": "SUSE Bug 1186283 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186283"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-34556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34556"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34556",
"url": "https://www.suse.com/security/cve/CVE-2021-34556"
},
{
"category": "external",
"summary": "SUSE Bug 1188983 for CVE-2021-34556",
"url": "https://bugzilla.suse.com/1188983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-34556"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3542",
"url": "https://www.suse.com/security/cve/CVE-2021-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1186063 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1186063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-3542"
},
{
"cve": "CVE-2021-35477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35477"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35477",
"url": "https://www.suse.com/security/cve/CVE-2021-35477"
},
{
"category": "external",
"summary": "SUSE Bug 1188985 for CVE-2021-35477",
"url": "https://bugzilla.suse.com/1188985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-35477"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3655"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3655",
"url": "https://www.suse.com/security/cve/CVE-2021-3655"
},
{
"category": "external",
"summary": "SUSE Bug 1188563 for CVE-2021-3655",
"url": "https://bugzilla.suse.com/1188563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "low"
}
],
"title": "CVE-2021-3655"
},
{
"cve": "CVE-2021-3659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3659"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3659",
"url": "https://www.suse.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-3659",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-3659"
},
{
"cve": "CVE-2021-3679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3679"
}
],
"notes": [
{
"category": "general",
"text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3679",
"url": "https://www.suse.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "SUSE Bug 1189057 for CVE-2021-3679",
"url": "https://bugzilla.suse.com/1189057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-3679"
},
{
"cve": "CVE-2021-3715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3715"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3715",
"url": "https://www.suse.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "SUSE Bug 1190349 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "external",
"summary": "SUSE Bug 1190350 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190350"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1196722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-3732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3732",
"url": "https://www.suse.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "SUSE Bug 1189706 for CVE-2021-3732",
"url": "https://bugzilla.suse.com/1189706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "low"
}
],
"title": "CVE-2021-3732"
},
{
"cve": "CVE-2021-3752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3752"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3752",
"url": "https://www.suse.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "SUSE Bug 1190023 for CVE-2021-3752",
"url": "https://bugzilla.suse.com/1190023"
},
{
"category": "external",
"summary": "SUSE Bug 1190432 for CVE-2021-3752",
"url": "https://bugzilla.suse.com/1190432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-3752"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "low"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3760"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3760",
"url": "https://www.suse.com/security/cve/CVE-2021-3760"
},
{
"category": "external",
"summary": "SUSE Bug 1190067 for CVE-2021-3760",
"url": "https://bugzilla.suse.com/1190067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-3760"
},
{
"cve": "CVE-2021-3772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3772"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3772",
"url": "https://www.suse.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "SUSE Bug 1190351 for CVE-2021-3772",
"url": "https://bugzilla.suse.com/1190351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-3772"
},
{
"cve": "CVE-2021-38160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38160"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38160",
"url": "https://www.suse.com/security/cve/CVE-2021-38160"
},
{
"category": "external",
"summary": "SUSE Bug 1190117 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "external",
"summary": "SUSE Bug 1190118 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190118"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-38160"
},
{
"cve": "CVE-2021-38198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38198"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38198",
"url": "https://www.suse.com/security/cve/CVE-2021-38198"
},
{
"category": "external",
"summary": "SUSE Bug 1189262 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "external",
"summary": "SUSE Bug 1189278 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189278"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-38198"
},
{
"cve": "CVE-2021-38204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38204"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38204",
"url": "https://www.suse.com/security/cve/CVE-2021-38204"
},
{
"category": "external",
"summary": "SUSE Bug 1189291 for CVE-2021-38204",
"url": "https://bugzilla.suse.com/1189291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-38204"
},
{
"cve": "CVE-2021-3896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3896"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3896",
"url": "https://www.suse.com/security/cve/CVE-2021-3896"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-3896",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-3896"
},
{
"cve": "CVE-2021-40490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-40490"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-40490",
"url": "https://www.suse.com/security/cve/CVE-2021-40490"
},
{
"category": "external",
"summary": "SUSE Bug 1190159 for CVE-2021-40490",
"url": "https://bugzilla.suse.com/1190159"
},
{
"category": "external",
"summary": "SUSE Bug 1192775 for CVE-2021-40490",
"url": "https://bugzilla.suse.com/1192775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-40490"
},
{
"cve": "CVE-2021-42008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42008"
}
],
"notes": [
{
"category": "general",
"text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42008",
"url": "https://www.suse.com/security/cve/CVE-2021-42008"
},
{
"category": "external",
"summary": "SUSE Bug 1191315 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "external",
"summary": "SUSE Bug 1191660 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191660"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-42008"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-base-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-default-devel-4.4.121-92.161.1.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-devel-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-macros-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-source-4.4.121-92.161.1.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:kernel-syms-4.4.121-92.161.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T09:57:42Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
suse-su-2024:2360-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2021-47103: net: sock: preserve kabi for sock (bsc#1221010).\n- CVE-2021-47191: Fix out-of-bound read in resp_readcap16() (bsc#1222866).\n- CVE-2021-47267: usb: fix various gadget panics on 10gbps cabling (bsc#1224993).\n- CVE-2021-47270: usb: fix various gadgets null ptr deref on 10gbps cabling (bsc#1224997).\n- CVE-2021-47293: net/sched: act_skbmod: Skip non-Ethernet packets (bsc#1224978).\n- CVE-2021-47294: netrom: Decrease sock refcount when sock timers expire (bsc#1224977).\n- CVE-2021-47297: net: fix uninit-value in caif_seqpkt_sendmsg (bsc#1224976).\n- CVE-2021-47309: net: validate lwtstate-\u003edata before returning from skb_tunnel_info() (bsc#1224967).\n- CVE-2021-47354: drm/sched: Avoid data corruptions (bsc#1225140)\n- CVE-2021-47372: net: macb: fix use after free on rmmod (bsc#1225184).\n- CVE-2021-47379: blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd (bsc#1225203).\n- CVE-2021-47407: KVM: x86: Handle SRCU initialization failure during page track init (bsc#1225306).\n- CVE-2021-47418: net_sched: fix NULL deref in fifo_set_limit() (bsc#1225337).\n- CVE-2021-47434: xhci: Fix commad ring abort, write all 64 bits to CRCR register (bsc#1225232).\n- CVE-2021-47445: drm/msm: Fix null pointer dereference on pointer edp (bsc#1225261)\n- CVE-2021-47518: nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done (bsc#1225372).\n- CVE-2021-47544: tcp: fix page frag corruption on page fault (bsc#1225463).\n- CVE-2021-47566: Fix clearing user buffer by properly using clear_user() (bsc#1225514).\n- CVE-2021-47571: staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() (bsc#1225518).\n- CVE-2021-47587: net: systemport: Add global locking for descriptor lifecycle (bsc#1226567).\n- CVE-2021-47602: mac80211: track only QoS data frames for admission control (bsc#1226554).\n- CVE-2021-47609: firmware: arm_scpi: Fix string overflow in SCPI genpd driver (bsc#1226562)\n- CVE-2022-48732: drm/nouveau: fix off by one in BIOS boundary checking (bsc#1226716)\n- CVE-2022-48733: btrfs: fix use-after-free after failure to create a snapshot (bsc#1226718).\n- CVE-2022-48740: selinux: fix double free of cond_list on error paths (bsc#1226699).\n- CVE-2022-48743: net: amd-xgbe: Fix skb data length underflow (bsc#1226705).\n- CVE-2022-48756: drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (bsc#1226698)\n- CVE-2022-48759: rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev (bsc#1226711).\n- CVE-2022-48761: usb: xhci-plat: fix crash when suspend if remote wake enable (bsc#1226701).\n- CVE-2022-48772: media: lgdt3306a: Add a check against null-pointer-def (bsc#1226976).\n- CVE-2023-52622: ext4: avoid online resizing failures due to oversized flex bg (bsc#1222080).\n- CVE-2023-52675: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() (bsc#1224504).\n- CVE-2023-52737: btrfs: lock the inode in shared mode before starting fiemap (bsc#1225484).\n- CVE-2023-52752: smb: client: fix use-after-free bug in cifs_debug_data_proc_show() (bsc#1225487).\n- CVE-2023-52754: media: imon: fix access to invalid resource for the second interface (bsc#1225490).\n- CVE-2023-52757: Fixed potential deadlock when releasing mids (bsc#1225548).\n- CVE-2023-52762: virtio-blk: fix implicit overflow on virtio_max_dma_size (bsc#1225573).\n- CVE-2023-52764: media: gspca: cpia1: shift-out-of-bounds in set_flicker (bsc#1225571).\n- CVE-2023-52784: bonding: stop the device in bond_setup_by_slave() (bsc#1224946).\n- CVE-2023-52832: wifi: mac80211: do not return unset power in ieee80211_get_tx_power() (bsc#1225577).\n- CVE-2023-52834: atl1c: Work around the DMA RX overflow issue (bsc#1225599).\n- CVE-2023-52835: perf/core: Bail out early if the request AUX area is out of bound (bsc#1225602).\n- CVE-2023-52843: llc: verify mac len before reading mac header (bsc#1224951).\n- CVE-2023-52845: tipc: Change nla_policy for bearer-related names to NLA_NUL_STRING (bsc#1225585).\n- CVE-2023-52855: usb: dwc2: fix possible NULL pointer dereference caused by driver concurrency (bsc#1225583).\n- CVE-2023-52881: tcp: do not accept ACK of bytes we never sent (bsc#1225611).\n- CVE-2024-26633: ip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim() (bsc#1221647).\n- CVE-2024-26641: ip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv() (bsc#1221654).\n- CVE-2024-26679: Fixed read sk-\u003esk_family once in inet_recv_error() (bsc#1222385).\n- CVE-2024-26687: Fixed xen/events close evtchn after mapping cleanup (bsc#1222435).\n- CVE-2024-26720: mm: Avoid overflows in dirty throttling logic (bsc#1222364).\n- CVE-2024-26813: vfio/platform: Create persistent IRQ handlers (bsc#1222809).\n- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).\n- CVE-2024-26894: ACPI: processor_idle: Fix memory leak in acpi_processor_power_exit() (bsc#1223043).\n- CVE-2024-26923: Fixed false-positive lockdep splat for spin_lock() in __unix_gc() (bsc#1223384).\n- CVE-2024-26928: Fixed potential UAF in cifs_debug_files_proc_show() (bsc#1223532).\n- CVE-2024-26973: fat: fix uninitialized field in nostale filehandles (git-fixesbsc#1223641).\n- CVE-2024-27399: Bluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout (bsc#1224177).\n- CVE-2024-27410: Reject iftype change with mesh ID change (bsc#1224432).\n- CVE-2024-35247: fpga: region: add owner module and take its refcount (bsc#1226948).\n- CVE-2024-35807: ext4: fix corruption during on-line resize (bsc#1224735).\n- CVE-2024-35822: usb: udc: remove warning when queue disabled ep (bsc#1224739).\n- CVE-2024-35835: net/mlx5e: fix a double-free in arfs_create_groups (bsc#1224605).\n- CVE-2024-35862: Fixed potential UAF in smb2_is_network_name_deleted() (bsc#1224764).\n- CVE-2024-35863: Fixed potential UAF in is_valid_oplock_break() (bsc#1224763).\n- CVE-2024-35864: Fixed potential UAF in smb2_is_valid_lease_break() (bsc#1224765).\n- CVE-2024-35865: Fixed potential UAF in smb2_is_valid_oplock_break() (bsc#1224668).\n- CVE-2024-35867: Fixed potential UAF in cifs_stats_proc_show() (bsc#1224664).\n- CVE-2024-35868: Fixed potential UAF in cifs_stats_proc_write() (bsc#1224678).\n- CVE-2024-35870: Fixed UAF in smb2_reconnect_server() (bsc#1224672).\n- CVE-2024-35886: ipv6: Fix infinite recursion in fib6_dump_done() (bsc#1224670).\n- CVE-2024-35922: fbmon: prevent division by zero in fb_videomode_from_videomode() (bsc#1224660)\n- CVE-2024-35925: block: prevent division by zero in blk_rq_stat_sum() (bsc#1224661).\n- CVE-2024-35930: scsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc() (bsc#1224651).\n- CVE-2024-35950: drm/client: Fully protect modes with dev-\u003emode_config.mutex (bsc#1224703).\n- CVE-2024-35956: Fixed qgroup prealloc rsv leak in subvolume operations (bsc#1224674)\n- CVE-2024-35958: net: ena: Fix incorrect descriptor free behavior (bsc#1224677).\n- CVE-2024-35960: net/mlx5: Properly link new fs rules into the tree (bsc#1224588).\n- CVE-2024-35976: Validate user input for XDP_{UMEM|COMPLETION}_FILL_RING (bsc#1224575).\n- CVE-2024-35979: raid1: fix use-after-free for original bio in raid1_write_request() (bsc#1224572).\n- CVE-2024-35997: Remove I2C_HID_READ_PENDING flag to prevent lock-up (bsc#1224552).\n- CVE-2024-35998: Fixed lock ordering potential deadlock in cifs_sync_mid_result (bsc#1224549).\n- CVE-2024-36016: tty: n_gsm: fix possible out-of-bounds in gsm0_receive() (bsc#1225642).\n- CVE-2024-36017: rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation (bsc#1225681).\n- CVE-2024-36479: fpga: bridge: add owner module and take its refcount (bsc#1226949).\n- CVE-2024-36592: scsi: lpfc: Move NPIV\u0027s transport unregistration to after resource clean up (bsc#1225898).\n- CVE-2024-36880: Bluetooth: qca: add missing firmware sanity checks (bsc#1225722).\n- CVE-2024-36894: usb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete (bsc#1225749).\n- CVE-2024-36915: nfc: llcp: fix nfc_llcp_setsockopt() unsafe copies (bsc#1225758).\n- CVE-2024-36917: block: fix overflow in blk_ioctl_discard() (bsc#1225770).\n- CVE-2024-36919: scsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload (bsc#1225767).\n- CVE-2024-36923: fs/9p: fix uninitialized values during inode evict (bsc#1225815).\n- CVE-2024-36934: bna: ensure the copied buf is NUL terminated (bsc#1225760).\n- CVE-2024-36938: Fixed NULL pointer dereference in sk_psock_skb_ingress_enqueue (bsc#1225761).\n- CVE-2024-36940: pinctrl: core: delete incorrect free in pinctrl_enable() (bsc#1225840).\n- CVE-2024-36949: amd/amdkfd: sync all devices to wait all processes being evicted (bsc#1225872)\n- CVE-2024-36950: firewire: ohci: mask bus reset interrupts between ISR and bottom half (bsc#1225895).\n- CVE-2024-36960: drm/vmwgfx: Fix invalid reads in fence signaled events (bsc#1225872)\n- CVE-2024-36964: fs/9p: only translate RWX permissions for plain 9P2000 (bsc#1225866).\n- CVE-2024-37021: fpga: manager: add owner module and take its refcount (bsc#1226950).\n- CVE-2024-37354: btrfs: fix crash on racing fsync and size-extending write into prealloc (bsc#1227101).\n- CVE-2024-38544: RDMA/rxe: Fix seg fault in rxe_comp_queue_pkt (bsc#1226597)\n- CVE-2024-38545: RDMA/hns: Fix UAF for cq async event (bsc#1226595).\n- CVE-2024-38546: drm: vc4: Fix possible null pointer dereference (bsc#1226593).\n- CVE-2024-38549: drm/mediatek: Add 0 size check to mtk_drm_gem_obj (bsc#1226735)\n- CVE-2024-38552: drm/amd/display: Fix potential index out of bounds in color (bsc#1226767)\n- CVE-2024-38553: net: fec: remove .ndo_poll_controller to avoid deadlock (bsc#1226744).\n- CVE-2024-38565: wifi: ar5523: enable proper endpoint verification (bsc#1226747).\n- CVE-2024-38567: wifi: carl9170: add a proper sanity check for endpoints (bsc#1226769).\n- CVE-2024-38578: ecryptfs: Fix buffer size for tag 66 packet (bsc#1226634.\n- CVE-2024-38579: crypto: bcm - Fix pointer arithmetic (bsc#1226637).\n- CVE-2024-38580: epoll: be better about file lifetimes (bsc#1226610).\n- CVE-2024-38597: eth: sungem: remove .ndo_poll_controller to avoid deadlocks (bsc#1226749).\n- CVE-2024-38608: net/mlx5e: Fix netif state handling (bsc#1226746).\n- CVE-2024-38618: ALSA: timer: Set lower bound of start tick time (bsc#1226754).\n- CVE-2024-38621: media: stk1160: fix bounds checking in stk1160_copy_video() (bsc#1226895).\n- CVE-2024-38627: stm class: Fix a double free in stm_register_device() (bsc#1226857).\n- CVE-2024-38659: enic: Validate length of nl attributes in enic_set_vf_port (bsc#1226883).\n- CVE-2024-38661: s390/ap: Fix crash in AP internal function modify_bitmap() (bsc#1226996).\n- CVE-2024-38780: dma-buf/sw-sync: do not enable IRQ from sync_print_obj() (bsc#1226886).\n\nThe following non-security bugs were fixed:\n\n- Btrfs: bail out on error during replay_dir_deletes (git-fixes)\n- Btrfs: clean up resources during umount after trans is aborted (git-fixes)\n- Btrfs: fix NULL pointer dereference in log_dir_items (git-fixes)\n- Btrfs: fix memory and mount leak in btrfs_ioctl_rm_dev_v2() (git-fixes)\n- Btrfs: fix unexpected EEXIST from btrfs_get_extent (git-fixes)\n- Btrfs: send, fix issuing write op when processing hole in no data mode (git-fixes)\n- Fix compilation\n- KVM: allow KVM_BUG/KVM_BUG_ON to handle 64-bit cond (git-fixes).\n- NFSv4: Always clear the pNFS layout when handling ESTALE (bsc#1221791).\n- NFSv4: nfs_set_open_stateid must not trigger state recovery for closed state (bsc#1221791).\n- PNFS for stateid errors retry against MDS first (bsc#1221791).\n- RDMA/mlx5: Add check for srq max_sge attribute (git-fixes)\n- USB: serial: option: add Foxconn T99W265 with new baseline (git-fixes).\n- USB: serial: option: add Quectel EG912Y module support (git-fixes).\n- USB: serial: option: add Quectel RM500Q R13 firmware support (git-fixes).\n- arm64: asm-bug: Add .align 2 to the end of __BUG_ENTRY (git-fixes).\n- blk-cgroup: Fix NULL deref caused by blkg_policy_data being installed before init (bsc#1216062 bsc#1225203).\n- blk-cgroup: fix missing pd_online_fn() while activating policy (git-fixes bsc#1225203).\n- blk-cgroup: support to track if policy is online (bsc#1216062 bsc#1225203).\n- bpf, scripts: Correct GPL license name (git-fixes).\n- bsc#1225894: Fix build warning\n- btrfs: add barriers to btrfs_sync_log before log_commit_wait wakeups (git-fixes)\n- btrfs: fix crash when trying to resume balance without the resume flag (git-fixes)\n- btrfs: fix describe_relocation when printing unknown flags (git-fixes)\n- btrfs: fix false EIO for missing device (git-fixes)\n- btrfs: tree-check: reduce stack consumption in check_dir_item (git-fixes)\n- btrfs: use correct compare function of dirty_metadata_bytes (git-fixes)\n- drm/amdkfd: Rework kfd_locked handling (bsc#1225872)\n- fix compat handling of FICLONERANGE, FIDEDUPERANGE and FS_IOC_FIEMAP (bsc#1225848).\n- fs: make fiemap work from compat_ioctl (bsc#1225848).\n- iommu/amd: Fix sysfs leak in iommu init (git-fixes).\n- iommu/vt-d: Allocate local memory for page request queue (git-fixes).\n- ipvs: Fix checksumming on GSO of SCTP packets (bsc#1221958)\n- kabi: blkcg_policy_data fix KABI (bsc#1216062 bsc#1225203).\n- mkspec-dtb: add toplevel symlinks also on arm\n- net: hsr: fix placement of logical operator in a multi-line statement (bsc#1223021).\n- net: usb: rtl8150 fix unintiatilzed variables in rtl8150_get_link_ksettings (git-fixes).\n- net: usb: smsc95xx: fix changing LED_SEL bit value updated from EEPROM (git-fixes).\n- nfsd: optimise recalculate_deny_mode() for a common case (bsc#1217912).\n- nvmet: fix ns enable/disable possible hang (git-fixes).\n- ocfs2: adjust enabling place for la window (bsc#1219224).\n- ocfs2: fix sparse warnings (bsc#1219224).\n- ocfs2: improve write IO performance when fragmentation is high (bsc#1219224).\n- ocfs2: speed up chain-list searching (bsc#1219224).\n- rpm/kernel-obs-build.spec.in: Add iso9660 (bsc#1226212) Some builds do not just create an iso9660 image, but also mount it during build.\n- rpm/kernel-obs-build.spec.in: Add networking modules for docker (bsc#1226211) docker needs more networking modules, even legacy iptable_nat and _filter.\n- rpm/kernel-obs-build.spec.in: Include algif_hash, aegis128 and xts modules afgif_hash is needed by some packages (e.g. iwd) for tests, xts is used for LUKS2 volumes by default and aegis128 is useful as AEAD cipher for LUKS2. Wrap the long line to make it readable.\n- rpm/mkspec-dtb: dtbs have moved to vendor sub-directories in 6.5 By commit 724ba6751532 (\u0027ARM: dts: Move .dts files to vendor sub-directories\u0027). So switch to them.\n- scsi: 3w-xxxx: Add error handling for initialization failure in tw_probe() (git-fixes).\n- scsi: 53c700: Check that command slot is not NULL (git-fixes).\n- scsi: be2iscsi: Add length check when parsing nlattrs (git-fixes).\n- scsi: be2iscsi: Fix a memleak in beiscsi_init_wrb_handle() (git-fixes).\n- scsi: bfa: Fix function pointer type mismatch for hcb_qe-\u003ecbfn (git-fixes).\n- scsi: bnx2fc: Fix skb double free in bnx2fc_rcv() (git-fixes).\n- scsi: core: Decrease scsi_device\u0027s iorequest_cnt if dispatch failed (git-fixes).\n- scsi: core: Fix legacy /proc parsing buffer overflow (git-fixes).\n- scsi: core: Fix possible memory leak if device_add() fails (git-fixes).\n- scsi: csiostor: Avoid function pointer casts (git-fixes).\n- scsi: isci: Fix an error code problem in isci_io_request_build() (git-fixes).\n- scsi: iscsi: Add length check for nlattr payload (git-fixes).\n- scsi: iscsi: Add strlen() check in iscsi_if_set{_host}_param() (git-fixes).\n- scsi: iscsi_tcp: restrict to TCP sockets (git-fixes).\n- scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() (git-fixes).\n- scsi: libsas: Add a helper sas_get_sas_addr_and_dev_type() (git-fixes).\n- scsi: libsas: Fix disk not being scanned in after being removed (git-fixes).\n- scsi: libsas: Introduce struct smp_disc_resp (git-fixes).\n- scsi: lpfc: Correct size for wqe for memset() (git-fixes).\n- scsi: lpfc: Fix double free in lpfc_cmpl_els_logo_acc() caused by lpfc_nlp_not_used() (git-fixes).\n- scsi: lpfc: Fix the NULL vs IS_ERR() bug for debugfs_create_file() (git-fixes).\n- scsi: megaraid_sas: Increase register read retry rount from 3 to 30 for selected registers (git-fixes).\n- scsi: mpt3sas: Fix in error path (git-fixes).\n- scsi: mpt3sas: Fix loop logic (git-fixes).\n- scsi: mpt3sas: Perform additional retries if doorbell read returns 0 (git-fixes).\n- scsi: qedf: Do not touch __user pointer in qedf_dbg_debug_cmd_read() directly (git-fixes).\n- scsi: qedf: Do not touch __user pointer in qedf_dbg_fp_int_cmd_read() directly (git-fixes).\n- scsi: qedf: Do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly (git-fixes).\n- scsi: qedf: Fix NULL dereference in error handling (git-fixes).\n- scsi: qedf: Fix firmware halt over suspend and resume (git-fixes).\n- scsi: qedi: Fix firmware halt over suspend and resume (git-fixes).\n- scsi: qedi: Fix potential deadlock on \u0026qedi_percpu-\u003ep_work_lock (git-fixes).\n- scsi: qla2xxx: Fix off by one in qla_edif_app_getstats() (git-fixes).\n- scsi: qla4xxx: Add length check when parsing nlattrs (git-fixes).\n- scsi: snic: Fix double free in snic_tgt_create() (git-fixes).\n- scsi: snic: Fix possible memory leak if device_add() fails (git-fixes).\n- scsi: stex: Fix gcc 13 warnings (git-fixes).\n- scsi: target: core: Add TMF to tmr_list handling (bsc#1223018).\n- usb: port: Do not try to peer unused USB ports based on location (git-fixes).\n- usb: typec: tcpm: Skip hard reset when in error recovery (git-fixes).\n- x86/tsc: Trust initial offset in architectural TSC-adjust MSRs (bsc#1222015 bsc#1226962).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2360,SUSE-SLE-SERVER-12-SP5-2024-2360",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2360-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2360-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242360-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2360-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035874.html"
},
{
"category": "self",
"summary": "SUSE Bug 1119113",
"url": "https://bugzilla.suse.com/1119113"
},
{
"category": "self",
"summary": "SUSE Bug 1171988",
"url": "https://bugzilla.suse.com/1171988"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1195065",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "self",
"summary": "SUSE Bug 1195254",
"url": "https://bugzilla.suse.com/1195254"
},
{
"category": "self",
"summary": "SUSE Bug 1195775",
"url": "https://bugzilla.suse.com/1195775"
},
{
"category": "self",
"summary": "SUSE Bug 1204514",
"url": "https://bugzilla.suse.com/1204514"
},
{
"category": "self",
"summary": "SUSE Bug 1216062",
"url": "https://bugzilla.suse.com/1216062"
},
{
"category": "self",
"summary": "SUSE Bug 1217912",
"url": "https://bugzilla.suse.com/1217912"
},
{
"category": "self",
"summary": "SUSE Bug 1218148",
"url": "https://bugzilla.suse.com/1218148"
},
{
"category": "self",
"summary": "SUSE Bug 1219224",
"url": "https://bugzilla.suse.com/1219224"
},
{
"category": "self",
"summary": "SUSE Bug 1221010",
"url": "https://bugzilla.suse.com/1221010"
},
{
"category": "self",
"summary": "SUSE Bug 1221647",
"url": "https://bugzilla.suse.com/1221647"
},
{
"category": "self",
"summary": "SUSE Bug 1221654",
"url": "https://bugzilla.suse.com/1221654"
},
{
"category": "self",
"summary": "SUSE Bug 1221791",
"url": "https://bugzilla.suse.com/1221791"
},
{
"category": "self",
"summary": "SUSE Bug 1221958",
"url": "https://bugzilla.suse.com/1221958"
},
{
"category": "self",
"summary": "SUSE Bug 1222015",
"url": "https://bugzilla.suse.com/1222015"
},
{
"category": "self",
"summary": "SUSE Bug 1222080",
"url": "https://bugzilla.suse.com/1222080"
},
{
"category": "self",
"summary": "SUSE Bug 1222364",
"url": "https://bugzilla.suse.com/1222364"
},
{
"category": "self",
"summary": "SUSE Bug 1222385",
"url": "https://bugzilla.suse.com/1222385"
},
{
"category": "self",
"summary": "SUSE Bug 1222435",
"url": "https://bugzilla.suse.com/1222435"
},
{
"category": "self",
"summary": "SUSE Bug 1222809",
"url": "https://bugzilla.suse.com/1222809"
},
{
"category": "self",
"summary": "SUSE Bug 1222866",
"url": "https://bugzilla.suse.com/1222866"
},
{
"category": "self",
"summary": "SUSE Bug 1222879",
"url": "https://bugzilla.suse.com/1222879"
},
{
"category": "self",
"summary": "SUSE Bug 1222893",
"url": "https://bugzilla.suse.com/1222893"
},
{
"category": "self",
"summary": "SUSE Bug 1223013",
"url": "https://bugzilla.suse.com/1223013"
},
{
"category": "self",
"summary": "SUSE Bug 1223018",
"url": "https://bugzilla.suse.com/1223018"
},
{
"category": "self",
"summary": "SUSE Bug 1223021",
"url": "https://bugzilla.suse.com/1223021"
},
{
"category": "self",
"summary": "SUSE Bug 1223043",
"url": "https://bugzilla.suse.com/1223043"
},
{
"category": "self",
"summary": "SUSE Bug 1223384",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "self",
"summary": "SUSE Bug 1223532",
"url": "https://bugzilla.suse.com/1223532"
},
{
"category": "self",
"summary": "SUSE Bug 1223641",
"url": "https://bugzilla.suse.com/1223641"
},
{
"category": "self",
"summary": "SUSE Bug 1224177",
"url": "https://bugzilla.suse.com/1224177"
},
{
"category": "self",
"summary": "SUSE Bug 1224432",
"url": "https://bugzilla.suse.com/1224432"
},
{
"category": "self",
"summary": "SUSE Bug 1224504",
"url": "https://bugzilla.suse.com/1224504"
},
{
"category": "self",
"summary": "SUSE Bug 1224549",
"url": "https://bugzilla.suse.com/1224549"
},
{
"category": "self",
"summary": "SUSE Bug 1224552",
"url": "https://bugzilla.suse.com/1224552"
},
{
"category": "self",
"summary": "SUSE Bug 1224572",
"url": "https://bugzilla.suse.com/1224572"
},
{
"category": "self",
"summary": "SUSE Bug 1224575",
"url": "https://bugzilla.suse.com/1224575"
},
{
"category": "self",
"summary": "SUSE Bug 1224583",
"url": "https://bugzilla.suse.com/1224583"
},
{
"category": "self",
"summary": "SUSE Bug 1224588",
"url": "https://bugzilla.suse.com/1224588"
},
{
"category": "self",
"summary": "SUSE Bug 1224605",
"url": "https://bugzilla.suse.com/1224605"
},
{
"category": "self",
"summary": "SUSE Bug 1224651",
"url": "https://bugzilla.suse.com/1224651"
},
{
"category": "self",
"summary": "SUSE Bug 1224660",
"url": "https://bugzilla.suse.com/1224660"
},
{
"category": "self",
"summary": "SUSE Bug 1224661",
"url": "https://bugzilla.suse.com/1224661"
},
{
"category": "self",
"summary": "SUSE Bug 1224662",
"url": "https://bugzilla.suse.com/1224662"
},
{
"category": "self",
"summary": "SUSE Bug 1224664",
"url": "https://bugzilla.suse.com/1224664"
},
{
"category": "self",
"summary": "SUSE Bug 1224668",
"url": "https://bugzilla.suse.com/1224668"
},
{
"category": "self",
"summary": "SUSE Bug 1224670",
"url": "https://bugzilla.suse.com/1224670"
},
{
"category": "self",
"summary": "SUSE Bug 1224672",
"url": "https://bugzilla.suse.com/1224672"
},
{
"category": "self",
"summary": "SUSE Bug 1224674",
"url": "https://bugzilla.suse.com/1224674"
},
{
"category": "self",
"summary": "SUSE Bug 1224677",
"url": "https://bugzilla.suse.com/1224677"
},
{
"category": "self",
"summary": "SUSE Bug 1224678",
"url": "https://bugzilla.suse.com/1224678"
},
{
"category": "self",
"summary": "SUSE Bug 1224703",
"url": "https://bugzilla.suse.com/1224703"
},
{
"category": "self",
"summary": "SUSE Bug 1224735",
"url": "https://bugzilla.suse.com/1224735"
},
{
"category": "self",
"summary": "SUSE Bug 1224739",
"url": "https://bugzilla.suse.com/1224739"
},
{
"category": "self",
"summary": "SUSE Bug 1224763",
"url": "https://bugzilla.suse.com/1224763"
},
{
"category": "self",
"summary": "SUSE Bug 1224764",
"url": "https://bugzilla.suse.com/1224764"
},
{
"category": "self",
"summary": "SUSE Bug 1224765",
"url": "https://bugzilla.suse.com/1224765"
},
{
"category": "self",
"summary": "SUSE Bug 1224946",
"url": "https://bugzilla.suse.com/1224946"
},
{
"category": "self",
"summary": "SUSE Bug 1224951",
"url": "https://bugzilla.suse.com/1224951"
},
{
"category": "self",
"summary": "SUSE Bug 1224967",
"url": "https://bugzilla.suse.com/1224967"
},
{
"category": "self",
"summary": "SUSE Bug 1224976",
"url": "https://bugzilla.suse.com/1224976"
},
{
"category": "self",
"summary": "SUSE Bug 1224977",
"url": "https://bugzilla.suse.com/1224977"
},
{
"category": "self",
"summary": "SUSE Bug 1224978",
"url": "https://bugzilla.suse.com/1224978"
},
{
"category": "self",
"summary": "SUSE Bug 1224993",
"url": "https://bugzilla.suse.com/1224993"
},
{
"category": "self",
"summary": "SUSE Bug 1224997",
"url": "https://bugzilla.suse.com/1224997"
},
{
"category": "self",
"summary": "SUSE Bug 1225047",
"url": "https://bugzilla.suse.com/1225047"
},
{
"category": "self",
"summary": "SUSE Bug 1225140",
"url": "https://bugzilla.suse.com/1225140"
},
{
"category": "self",
"summary": "SUSE Bug 1225184",
"url": "https://bugzilla.suse.com/1225184"
},
{
"category": "self",
"summary": "SUSE Bug 1225203",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "self",
"summary": "SUSE Bug 1225232",
"url": "https://bugzilla.suse.com/1225232"
},
{
"category": "self",
"summary": "SUSE Bug 1225261",
"url": "https://bugzilla.suse.com/1225261"
},
{
"category": "self",
"summary": "SUSE Bug 1225306",
"url": "https://bugzilla.suse.com/1225306"
},
{
"category": "self",
"summary": "SUSE Bug 1225337",
"url": "https://bugzilla.suse.com/1225337"
},
{
"category": "self",
"summary": "SUSE Bug 1225372",
"url": "https://bugzilla.suse.com/1225372"
},
{
"category": "self",
"summary": "SUSE Bug 1225463",
"url": "https://bugzilla.suse.com/1225463"
},
{
"category": "self",
"summary": "SUSE Bug 1225484",
"url": "https://bugzilla.suse.com/1225484"
},
{
"category": "self",
"summary": "SUSE Bug 1225487",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "self",
"summary": "SUSE Bug 1225490",
"url": "https://bugzilla.suse.com/1225490"
},
{
"category": "self",
"summary": "SUSE Bug 1225514",
"url": "https://bugzilla.suse.com/1225514"
},
{
"category": "self",
"summary": "SUSE Bug 1225518",
"url": "https://bugzilla.suse.com/1225518"
},
{
"category": "self",
"summary": "SUSE Bug 1225548",
"url": "https://bugzilla.suse.com/1225548"
},
{
"category": "self",
"summary": "SUSE Bug 1225555",
"url": "https://bugzilla.suse.com/1225555"
},
{
"category": "self",
"summary": "SUSE Bug 1225556",
"url": "https://bugzilla.suse.com/1225556"
},
{
"category": "self",
"summary": "SUSE Bug 1225559",
"url": "https://bugzilla.suse.com/1225559"
},
{
"category": "self",
"summary": "SUSE Bug 1225571",
"url": "https://bugzilla.suse.com/1225571"
},
{
"category": "self",
"summary": "SUSE Bug 1225573",
"url": "https://bugzilla.suse.com/1225573"
},
{
"category": "self",
"summary": "SUSE Bug 1225577",
"url": "https://bugzilla.suse.com/1225577"
},
{
"category": "self",
"summary": "SUSE Bug 1225583",
"url": "https://bugzilla.suse.com/1225583"
},
{
"category": "self",
"summary": "SUSE Bug 1225585",
"url": "https://bugzilla.suse.com/1225585"
},
{
"category": "self",
"summary": "SUSE Bug 1225599",
"url": "https://bugzilla.suse.com/1225599"
},
{
"category": "self",
"summary": "SUSE Bug 1225602",
"url": "https://bugzilla.suse.com/1225602"
},
{
"category": "self",
"summary": "SUSE Bug 1225611",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "self",
"summary": "SUSE Bug 1225642",
"url": "https://bugzilla.suse.com/1225642"
},
{
"category": "self",
"summary": "SUSE Bug 1225681",
"url": "https://bugzilla.suse.com/1225681"
},
{
"category": "self",
"summary": "SUSE Bug 1225704",
"url": "https://bugzilla.suse.com/1225704"
},
{
"category": "self",
"summary": "SUSE Bug 1225722",
"url": "https://bugzilla.suse.com/1225722"
},
{
"category": "self",
"summary": "SUSE Bug 1225749",
"url": "https://bugzilla.suse.com/1225749"
},
{
"category": "self",
"summary": "SUSE Bug 1225758",
"url": "https://bugzilla.suse.com/1225758"
},
{
"category": "self",
"summary": "SUSE Bug 1225760",
"url": "https://bugzilla.suse.com/1225760"
},
{
"category": "self",
"summary": "SUSE Bug 1225761",
"url": "https://bugzilla.suse.com/1225761"
},
{
"category": "self",
"summary": "SUSE Bug 1225767",
"url": "https://bugzilla.suse.com/1225767"
},
{
"category": "self",
"summary": "SUSE Bug 1225770",
"url": "https://bugzilla.suse.com/1225770"
},
{
"category": "self",
"summary": "SUSE Bug 1225815",
"url": "https://bugzilla.suse.com/1225815"
},
{
"category": "self",
"summary": "SUSE Bug 1225840",
"url": "https://bugzilla.suse.com/1225840"
},
{
"category": "self",
"summary": "SUSE Bug 1225848",
"url": "https://bugzilla.suse.com/1225848"
},
{
"category": "self",
"summary": "SUSE Bug 1225866",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "self",
"summary": "SUSE Bug 1225872",
"url": "https://bugzilla.suse.com/1225872"
},
{
"category": "self",
"summary": "SUSE Bug 1225894",
"url": "https://bugzilla.suse.com/1225894"
},
{
"category": "self",
"summary": "SUSE Bug 1225895",
"url": "https://bugzilla.suse.com/1225895"
},
{
"category": "self",
"summary": "SUSE Bug 1225898",
"url": "https://bugzilla.suse.com/1225898"
},
{
"category": "self",
"summary": "SUSE Bug 1226211",
"url": "https://bugzilla.suse.com/1226211"
},
{
"category": "self",
"summary": "SUSE Bug 1226212",
"url": "https://bugzilla.suse.com/1226212"
},
{
"category": "self",
"summary": "SUSE Bug 1226537",
"url": "https://bugzilla.suse.com/1226537"
},
{
"category": "self",
"summary": "SUSE Bug 1226554",
"url": "https://bugzilla.suse.com/1226554"
},
{
"category": "self",
"summary": "SUSE Bug 1226557",
"url": "https://bugzilla.suse.com/1226557"
},
{
"category": "self",
"summary": "SUSE Bug 1226562",
"url": "https://bugzilla.suse.com/1226562"
},
{
"category": "self",
"summary": "SUSE Bug 1226567",
"url": "https://bugzilla.suse.com/1226567"
},
{
"category": "self",
"summary": "SUSE Bug 1226575",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "self",
"summary": "SUSE Bug 1226577",
"url": "https://bugzilla.suse.com/1226577"
},
{
"category": "self",
"summary": "SUSE Bug 1226593",
"url": "https://bugzilla.suse.com/1226593"
},
{
"category": "self",
"summary": "SUSE Bug 1226595",
"url": "https://bugzilla.suse.com/1226595"
},
{
"category": "self",
"summary": "SUSE Bug 1226597",
"url": "https://bugzilla.suse.com/1226597"
},
{
"category": "self",
"summary": "SUSE Bug 1226610",
"url": "https://bugzilla.suse.com/1226610"
},
{
"category": "self",
"summary": "SUSE Bug 1226614",
"url": "https://bugzilla.suse.com/1226614"
},
{
"category": "self",
"summary": "SUSE Bug 1226619",
"url": "https://bugzilla.suse.com/1226619"
},
{
"category": "self",
"summary": "SUSE Bug 1226621",
"url": "https://bugzilla.suse.com/1226621"
},
{
"category": "self",
"summary": "SUSE Bug 1226634",
"url": "https://bugzilla.suse.com/1226634"
},
{
"category": "self",
"summary": "SUSE Bug 1226637",
"url": "https://bugzilla.suse.com/1226637"
},
{
"category": "self",
"summary": "SUSE Bug 1226670",
"url": "https://bugzilla.suse.com/1226670"
},
{
"category": "self",
"summary": "SUSE Bug 1226672",
"url": "https://bugzilla.suse.com/1226672"
},
{
"category": "self",
"summary": "SUSE Bug 1226692",
"url": "https://bugzilla.suse.com/1226692"
},
{
"category": "self",
"summary": "SUSE Bug 1226698",
"url": "https://bugzilla.suse.com/1226698"
},
{
"category": "self",
"summary": "SUSE Bug 1226699",
"url": "https://bugzilla.suse.com/1226699"
},
{
"category": "self",
"summary": "SUSE Bug 1226701",
"url": "https://bugzilla.suse.com/1226701"
},
{
"category": "self",
"summary": "SUSE Bug 1226705",
"url": "https://bugzilla.suse.com/1226705"
},
{
"category": "self",
"summary": "SUSE Bug 1226708",
"url": "https://bugzilla.suse.com/1226708"
},
{
"category": "self",
"summary": "SUSE Bug 1226711",
"url": "https://bugzilla.suse.com/1226711"
},
{
"category": "self",
"summary": "SUSE Bug 1226712",
"url": "https://bugzilla.suse.com/1226712"
},
{
"category": "self",
"summary": "SUSE Bug 1226716",
"url": "https://bugzilla.suse.com/1226716"
},
{
"category": "self",
"summary": "SUSE Bug 1226718",
"url": "https://bugzilla.suse.com/1226718"
},
{
"category": "self",
"summary": "SUSE Bug 1226732",
"url": "https://bugzilla.suse.com/1226732"
},
{
"category": "self",
"summary": "SUSE Bug 1226735",
"url": "https://bugzilla.suse.com/1226735"
},
{
"category": "self",
"summary": "SUSE Bug 1226744",
"url": "https://bugzilla.suse.com/1226744"
},
{
"category": "self",
"summary": "SUSE Bug 1226746",
"url": "https://bugzilla.suse.com/1226746"
},
{
"category": "self",
"summary": "SUSE Bug 1226747",
"url": "https://bugzilla.suse.com/1226747"
},
{
"category": "self",
"summary": "SUSE Bug 1226749",
"url": "https://bugzilla.suse.com/1226749"
},
{
"category": "self",
"summary": "SUSE Bug 1226754",
"url": "https://bugzilla.suse.com/1226754"
},
{
"category": "self",
"summary": "SUSE Bug 1226767",
"url": "https://bugzilla.suse.com/1226767"
},
{
"category": "self",
"summary": "SUSE Bug 1226769",
"url": "https://bugzilla.suse.com/1226769"
},
{
"category": "self",
"summary": "SUSE Bug 1226857",
"url": "https://bugzilla.suse.com/1226857"
},
{
"category": "self",
"summary": "SUSE Bug 1226876",
"url": "https://bugzilla.suse.com/1226876"
},
{
"category": "self",
"summary": "SUSE Bug 1226883",
"url": "https://bugzilla.suse.com/1226883"
},
{
"category": "self",
"summary": "SUSE Bug 1226886",
"url": "https://bugzilla.suse.com/1226886"
},
{
"category": "self",
"summary": "SUSE Bug 1226895",
"url": "https://bugzilla.suse.com/1226895"
},
{
"category": "self",
"summary": "SUSE Bug 1226948",
"url": "https://bugzilla.suse.com/1226948"
},
{
"category": "self",
"summary": "SUSE Bug 1226949",
"url": "https://bugzilla.suse.com/1226949"
},
{
"category": "self",
"summary": "SUSE Bug 1226950",
"url": "https://bugzilla.suse.com/1226950"
},
{
"category": "self",
"summary": "SUSE Bug 1226962",
"url": "https://bugzilla.suse.com/1226962"
},
{
"category": "self",
"summary": "SUSE Bug 1226976",
"url": "https://bugzilla.suse.com/1226976"
},
{
"category": "self",
"summary": "SUSE Bug 1226996",
"url": "https://bugzilla.suse.com/1226996"
},
{
"category": "self",
"summary": "SUSE Bug 1227101",
"url": "https://bugzilla.suse.com/1227101"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-10135 page",
"url": "https://www.suse.com/security/cve/CVE-2020-10135/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4439 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4439/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47103 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47191 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47193 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47193/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47267 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47267/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47270 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47270/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47293 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47294 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47294/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47297 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47297/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47309 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47328 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47354 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47354/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47372 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47372/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47379 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47379/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47407 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47418 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47418/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47434 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47434/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47445 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47445/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47518 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47518/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47544 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47566 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47566/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47571 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47571/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47587 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47587/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47589 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47600 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47602 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47603 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-47617 page",
"url": "https://www.suse.com/security/cve/CVE-2021-47617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0435 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0435/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22942 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22942/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48711 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48715 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48722 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48722/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48732 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48733 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48740 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48743 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48754 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48756 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48756/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48758 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48759 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48760 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48761 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48771 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-48772 page",
"url": "https://www.suse.com/security/cve/CVE-2022-48772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-24023 page",
"url": "https://www.suse.com/security/cve/CVE-2023-24023/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52622 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52675 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52675/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52737 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52752 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52754 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52754/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52757 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52762 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52764 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52784 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52784/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52808 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52809 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52811 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52832 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52832/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52834 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52834/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52835 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52843 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52845 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52855 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52855/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-52881 page",
"url": "https://www.suse.com/security/cve/CVE-2023-52881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26633 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26633/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26641 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26641/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26679 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26687 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26687/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26720 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26813 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26813/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26845 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26845/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26863 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26894 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26894/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26928 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26928/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-26973 page",
"url": "https://www.suse.com/security/cve/CVE-2024-26973/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27399 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-27410 page",
"url": "https://www.suse.com/security/cve/CVE-2024-27410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35247 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35247/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35807 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35822 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35822/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35835 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35862 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35863 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35863/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35864 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35865 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35867 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35867/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35868 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35870 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35870/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35886 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35896 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35922 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35922/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35925 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35925/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35930 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35930/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35950 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35956 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35956/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35958 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35958/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35960 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35960/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35962 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35962/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35976 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35979 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35979/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35997 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-35998 page",
"url": "https://www.suse.com/security/cve/CVE-2024-35998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36016 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36017 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36025 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36025/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36479 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36479/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36592 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36880 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36894 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36894/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36915 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36915/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36917 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36919 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36923 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36923/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36934 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36938 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36938/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36940 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36940/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36949 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36949/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36950 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36950/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36960 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36960/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-36964 page",
"url": "https://www.suse.com/security/cve/CVE-2024-36964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37021 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-37354 page",
"url": "https://www.suse.com/security/cve/CVE-2024-37354/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38544 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38545 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38546 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38549 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38549/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38552 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38553 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38553/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38565 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38565/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38567 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38567/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38578 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38578/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38579 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38580 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38597 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38601 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38608 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38618 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38621 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38627 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38659 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38661 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38661/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-38780 page",
"url": "https://www.suse.com/security/cve/CVE-2024-38780/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2024-07-09T14:01:02Z",
"generator": {
"date": "2024-07-09T14:01:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2360-1",
"initial_release_date": "2024-07-09T14:01:02Z",
"revision_history": [
{
"date": "2024-07-09T14:01:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-4.12.14-16.191.1.noarch",
"product": {
"name": "kernel-devel-azure-4.12.14-16.191.1.noarch",
"product_id": "kernel-devel-azure-4.12.14-16.191.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-4.12.14-16.191.1.noarch",
"product": {
"name": "kernel-source-azure-4.12.14-16.191.1.noarch",
"product_id": "kernel-source-azure-4.12.14-16.191.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-4.12.14-16.191.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-4.12.14-16.191.1.x86_64",
"product_id": "cluster-md-kmp-azure-4.12.14-16.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-4.12.14-16.191.1.x86_64",
"product": {
"name": "dlm-kmp-azure-4.12.14-16.191.1.x86_64",
"product_id": "dlm-kmp-azure-4.12.14-16.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-4.12.14-16.191.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-4.12.14-16.191.1.x86_64",
"product_id": "gfs2-kmp-azure-4.12.14-16.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-4.12.14-16.191.1.x86_64",
"product": {
"name": "kernel-azure-4.12.14-16.191.1.x86_64",
"product_id": "kernel-azure-4.12.14-16.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-base-4.12.14-16.191.1.x86_64",
"product": {
"name": "kernel-azure-base-4.12.14-16.191.1.x86_64",
"product_id": "kernel-azure-base-4.12.14-16.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-4.12.14-16.191.1.x86_64",
"product": {
"name": "kernel-azure-devel-4.12.14-16.191.1.x86_64",
"product_id": "kernel-azure-devel-4.12.14-16.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-4.12.14-16.191.1.x86_64",
"product": {
"name": "kernel-azure-extra-4.12.14-16.191.1.x86_64",
"product_id": "kernel-azure-extra-4.12.14-16.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-kgraft-devel-4.12.14-16.191.1.x86_64",
"product": {
"name": "kernel-azure-kgraft-devel-4.12.14-16.191.1.x86_64",
"product_id": "kernel-azure-kgraft-devel-4.12.14-16.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-4.12.14-16.191.1.x86_64",
"product": {
"name": "kernel-syms-azure-4.12.14-16.191.1.x86_64",
"product_id": "kernel-syms-azure-4.12.14-16.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-4.12.14-16.191.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-4.12.14-16.191.1.x86_64",
"product_id": "kselftests-kmp-azure-4.12.14-16.191.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-4.12.14-16.191.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-4.12.14-16.191.1.x86_64",
"product_id": "ocfs2-kmp-azure-4.12.14-16.191.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.191.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.191.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.191.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.191.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.191.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.191.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.191.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.191.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-4.12.14-16.191.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64"
},
"product_reference": "kernel-azure-4.12.14-16.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-base-4.12.14-16.191.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64"
},
"product_reference": "kernel-azure-base-4.12.14-16.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-4.12.14-16.191.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64"
},
"product_reference": "kernel-azure-devel-4.12.14-16.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-4.12.14-16.191.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch"
},
"product_reference": "kernel-devel-azure-4.12.14-16.191.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-4.12.14-16.191.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch"
},
"product_reference": "kernel-source-azure-4.12.14-16.191.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-4.12.14-16.191.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
},
"product_reference": "kernel-syms-azure-4.12.14-16.191.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-10135",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-10135"
}
],
"notes": [
{
"category": "general",
"text": "Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may allow an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-10135",
"url": "https://www.suse.com/security/cve/CVE-2020-10135"
},
{
"category": "external",
"summary": "SUSE Bug 1171988 for CVE-2020-10135",
"url": "https://bugzilla.suse.com/1171988"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2020-10135"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2021-4439",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4439"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nisdn: cpai: check ctr-\u003ecnr to avoid array index out of bound\n\nThe cmtp_add_connection() would add a cmtp session to a controller\nand run a kernel thread to process cmtp.\n\n\t__module_get(THIS_MODULE);\n\tsession-\u003etask = kthread_run(cmtp_session, session, \"kcmtpd_ctr_%d\",\n\t\t\t\t\t\t\t\tsession-\u003enum);\n\nDuring this process, the kernel thread would call detach_capi_ctr()\nto detach a register controller. if the controller\nwas not attached yet, detach_capi_ctr() would\ntrigger an array-index-out-bounds bug.\n\n[ 46.866069][ T6479] UBSAN: array-index-out-of-bounds in\ndrivers/isdn/capi/kcapi.c:483:21\n[ 46.867196][ T6479] index -1 is out of range for type \u0027capi_ctr *[32]\u0027\n[ 46.867982][ T6479] CPU: 1 PID: 6479 Comm: kcmtpd_ctr_0 Not tainted\n5.15.0-rc2+ #8\n[ 46.869002][ T6479] Hardware name: QEMU Standard PC (i440FX + PIIX,\n1996), BIOS 1.14.0-2 04/01/2014\n[ 46.870107][ T6479] Call Trace:\n[ 46.870473][ T6479] dump_stack_lvl+0x57/0x7d\n[ 46.870974][ T6479] ubsan_epilogue+0x5/0x40\n[ 46.871458][ T6479] __ubsan_handle_out_of_bounds.cold+0x43/0x48\n[ 46.872135][ T6479] detach_capi_ctr+0x64/0xc0\n[ 46.872639][ T6479] cmtp_session+0x5c8/0x5d0\n[ 46.873131][ T6479] ? __init_waitqueue_head+0x60/0x60\n[ 46.873712][ T6479] ? cmtp_add_msgpart+0x120/0x120\n[ 46.874256][ T6479] kthread+0x147/0x170\n[ 46.874709][ T6479] ? set_kthread_struct+0x40/0x40\n[ 46.875248][ T6479] ret_from_fork+0x1f/0x30\n[ 46.875773][ T6479]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4439",
"url": "https://www.suse.com/security/cve/CVE-2021-4439"
},
{
"category": "external",
"summary": "SUSE Bug 1226670 for CVE-2021-4439",
"url": "https://bugzilla.suse.com/1226670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-4439"
},
{
"cve": "CVE-2021-47103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47103"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: fully convert sk-\u003esk_rx_dst to RCU rules\n\nsyzbot reported various issues around early demux,\none being included in this changelog [1]\n\nsk-\u003esk_rx_dst is using RCU protection without clearly\ndocumenting it.\n\nAnd following sequences in tcp_v4_do_rcv()/tcp_v6_do_rcv()\nare not following standard RCU rules.\n\n[a] dst_release(dst);\n[b] sk-\u003esk_rx_dst = NULL;\n\nThey look wrong because a delete operation of RCU protected\npointer is supposed to clear the pointer before\nthe call_rcu()/synchronize_rcu() guarding actual memory freeing.\n\nIn some cases indeed, dst could be freed before [b] is done.\n\nWe could cheat by clearing sk_rx_dst before calling\ndst_release(), but this seems the right time to stick\nto standard RCU annotations and debugging facilities.\n\n[1]\nBUG: KASAN: use-after-free in dst_check include/net/dst.h:470 [inline]\nBUG: KASAN: use-after-free in tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792\nRead of size 2 at addr ffff88807f1cb73a by task syz-executor.5/9204\n\nCPU: 0 PID: 9204 Comm: syz-executor.5 Not tainted 5.16.0-rc5-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106\n print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247\n __kasan_report mm/kasan/report.c:433 [inline]\n kasan_report.cold+0x83/0xdf mm/kasan/report.c:450\n dst_check include/net/dst.h:470 [inline]\n tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792\n ip_rcv_finish_core.constprop.0+0x15de/0x1e80 net/ipv4/ip_input.c:340\n ip_list_rcv_finish.constprop.0+0x1b2/0x6e0 net/ipv4/ip_input.c:583\n ip_sublist_rcv net/ipv4/ip_input.c:609 [inline]\n ip_list_rcv+0x34e/0x490 net/ipv4/ip_input.c:644\n __netif_receive_skb_list_ptype net/core/dev.c:5508 [inline]\n __netif_receive_skb_list_core+0x549/0x8e0 net/core/dev.c:5556\n __netif_receive_skb_list net/core/dev.c:5608 [inline]\n netif_receive_skb_list_internal+0x75e/0xd80 net/core/dev.c:5699\n gro_normal_list net/core/dev.c:5853 [inline]\n gro_normal_list net/core/dev.c:5849 [inline]\n napi_complete_done+0x1f1/0x880 net/core/dev.c:6590\n virtqueue_napi_complete drivers/net/virtio_net.c:339 [inline]\n virtnet_poll+0xca2/0x11b0 drivers/net/virtio_net.c:1557\n __napi_poll+0xaf/0x440 net/core/dev.c:7023\n napi_poll net/core/dev.c:7090 [inline]\n net_rx_action+0x801/0xb40 net/core/dev.c:7177\n __do_softirq+0x29b/0x9c2 kernel/softirq.c:558\n invoke_softirq kernel/softirq.c:432 [inline]\n __irq_exit_rcu+0x123/0x180 kernel/softirq.c:637\n irq_exit_rcu+0x5/0x20 kernel/softirq.c:649\n common_interrupt+0x52/0xc0 arch/x86/kernel/irq.c:240\n asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:629\nRIP: 0033:0x7f5e972bfd57\nCode: 39 d1 73 14 0f 1f 80 00 00 00 00 48 8b 50 f8 48 83 e8 08 48 39 ca 77 f3 48 39 c3 73 3e 48 89 13 48 8b 50 f8 48 89 38 49 8b 0e \u003c48\u003e 8b 3e 48 83 c3 08 48 83 c6 08 eb bc 48 39 d1 72 9e 48 39 d0 73\nRSP: 002b:00007fff8a413210 EFLAGS: 00000283\nRAX: 00007f5e97108990 RBX: 00007f5e97108338 RCX: ffffffff81d3aa45\nRDX: ffffffff81d3aa45 RSI: 00007f5e97108340 RDI: ffffffff81d3aa45\nRBP: 00007f5e97107eb8 R08: 00007f5e97108d88 R09: 0000000093c2e8d9\nR10: 0000000000000000 R11: 0000000000000000 R12: 00007f5e97107eb0\nR13: 00007f5e97108338 R14: 00007f5e97107ea8 R15: 0000000000000019\n \u003c/TASK\u003e\n\nAllocated by task 13:\n kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38\n kasan_set_track mm/kasan/common.c:46 [inline]\n set_alloc_info mm/kasan/common.c:434 [inline]\n __kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:467\n kasan_slab_alloc include/linux/kasan.h:259 [inline]\n slab_post_alloc_hook mm/slab.h:519 [inline]\n slab_alloc_node mm/slub.c:3234 [inline]\n slab_alloc mm/slub.c:3242 [inline]\n kmem_cache_alloc+0x202/0x3a0 mm/slub.c:3247\n dst_alloc+0x146/0x1f0 net/core/dst.c:92\n rt_dst_alloc+0x73/0x430 net/ipv4/route.c:1613\n ip_route_input_slow+0x1817/0x3a20 net/ipv4/route.c:234\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47103",
"url": "https://www.suse.com/security/cve/CVE-2021-47103"
},
{
"category": "external",
"summary": "SUSE Bug 1221010 for CVE-2021-47103",
"url": "https://bugzilla.suse.com/1221010"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47103"
},
{
"cve": "CVE-2021-47191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47191"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Fix out-of-bound read in resp_readcap16()\n\nThe following warning was observed running syzkaller:\n\n[ 3813.830724] sg_write: data in/out 65466/242 bytes for SCSI command 0x9e-- guessing data in;\n[ 3813.830724] program syz-executor not setting count and/or reply_len properly\n[ 3813.836956] ==================================================================\n[ 3813.839465] BUG: KASAN: stack-out-of-bounds in sg_copy_buffer+0x157/0x1e0\n[ 3813.841773] Read of size 4096 at addr ffff8883cf80f540 by task syz-executor/1549\n[ 3813.846612] Call Trace:\n[ 3813.846995] dump_stack+0x108/0x15f\n[ 3813.847524] print_address_description+0xa5/0x372\n[ 3813.848243] kasan_report.cold+0x236/0x2a8\n[ 3813.849439] check_memory_region+0x240/0x270\n[ 3813.850094] memcpy+0x30/0x80\n[ 3813.850553] sg_copy_buffer+0x157/0x1e0\n[ 3813.853032] sg_copy_from_buffer+0x13/0x20\n[ 3813.853660] fill_from_dev_buffer+0x135/0x370\n[ 3813.854329] resp_readcap16+0x1ac/0x280\n[ 3813.856917] schedule_resp+0x41f/0x1630\n[ 3813.858203] scsi_debug_queuecommand+0xb32/0x17e0\n[ 3813.862699] scsi_dispatch_cmd+0x330/0x950\n[ 3813.863329] scsi_request_fn+0xd8e/0x1710\n[ 3813.863946] __blk_run_queue+0x10b/0x230\n[ 3813.864544] blk_execute_rq_nowait+0x1d8/0x400\n[ 3813.865220] sg_common_write.isra.0+0xe61/0x2420\n[ 3813.871637] sg_write+0x6c8/0xef0\n[ 3813.878853] __vfs_write+0xe4/0x800\n[ 3813.883487] vfs_write+0x17b/0x530\n[ 3813.884008] ksys_write+0x103/0x270\n[ 3813.886268] __x64_sys_write+0x77/0xc0\n[ 3813.886841] do_syscall_64+0x106/0x360\n[ 3813.887415] entry_SYSCALL_64_after_hwframe+0x44/0xa9\n\nThis issue can be reproduced with the following syzkaller log:\n\nr0 = openat(0xffffffffffffff9c, \u0026(0x7f0000000040)=\u0027./file0\\x00\u0027, 0x26e1, 0x0)\nr1 = syz_open_procfs(0xffffffffffffffff, \u0026(0x7f0000000000)=\u0027fd/3\\x00\u0027)\nopen_by_handle_at(r1, \u0026(0x7f00000003c0)=ANY=[@ANYRESHEX], 0x602000)\nr2 = syz_open_dev$sg(\u0026(0x7f0000000000), 0x0, 0x40782)\nwrite$binfmt_aout(r2, \u0026(0x7f0000000340)=ANY=[@ANYBLOB=\"00000000deff000000000000000000000000000000000000000000000000000047f007af9e107a41ec395f1bded7be24277a1501ff6196a83366f4e6362bc0ff2b247f68a972989b094b2da4fb3607fcf611a22dd04310d28c75039d\"], 0x126)\n\nIn resp_readcap16() we get \"int alloc_len\" value -1104926854, and then pass\nthe huge arr_len to fill_from_dev_buffer(), but arr is only 32 bytes. This\nleads to OOB in sg_copy_buffer().\n\nTo solve this issue, define alloc_len as u32.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47191",
"url": "https://www.suse.com/security/cve/CVE-2021-47191"
},
{
"category": "external",
"summary": "SUSE Bug 1222866 for CVE-2021-47191",
"url": "https://bugzilla.suse.com/1222866"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47191"
},
{
"cve": "CVE-2021-47193",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47193"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm80xx: Fix memory leak during rmmod\n\nDriver failed to release all memory allocated. This would lead to memory\nleak during driver removal.\n\nProperly free memory when the module is removed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47193",
"url": "https://www.suse.com/security/cve/CVE-2021-47193"
},
{
"category": "external",
"summary": "SUSE Bug 1222879 for CVE-2021-47193",
"url": "https://bugzilla.suse.com/1222879"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47193"
},
{
"cve": "CVE-2021-47267",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47267"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: fix various gadget panics on 10gbps cabling\n\nusb_assign_descriptors() is called with 5 parameters,\nthe last 4 of which are the usb_descriptor_header for:\n full-speed (USB1.1 - 12Mbps [including USB1.0 low-speed @ 1.5Mbps),\n high-speed (USB2.0 - 480Mbps),\n super-speed (USB3.0 - 5Gbps),\n super-speed-plus (USB3.1 - 10Gbps).\n\nThe differences between full/high/super-speed descriptors are usually\nsubstantial (due to changes in the maximum usb block size from 64 to 512\nto 1024 bytes and other differences in the specs), while the difference\nbetween 5 and 10Gbps descriptors may be as little as nothing\n(in many cases the same tuning is simply good enough).\n\nHowever if a gadget driver calls usb_assign_descriptors() with\na NULL descriptor for super-speed-plus and is then used on a max 10gbps\nconfiguration, the kernel will crash with a null pointer dereference,\nwhen a 10gbps capable device port + cable + host port combination shows up.\n(This wouldn\u0027t happen if the gadget max-speed was set to 5gbps, but\nit of course defaults to the maximum, and there\u0027s no real reason to\nartificially limit it)\n\nThe fix is to simply use the 5gbps descriptor as the 10gbps descriptor,\nif a 10gbps descriptor wasn\u0027t provided.\n\nObviously this won\u0027t fix the problem if the 5gbps descriptor is also\nNULL, but such cases can\u0027t be so trivially solved (and any such gadgets\nare unlikely to be used with USB3 ports any way).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47267",
"url": "https://www.suse.com/security/cve/CVE-2021-47267"
},
{
"category": "external",
"summary": "SUSE Bug 1224993 for CVE-2021-47267",
"url": "https://bugzilla.suse.com/1224993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47267"
},
{
"cve": "CVE-2021-47270",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47270"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: fix various gadgets null ptr deref on 10gbps cabling.\n\nThis avoids a null pointer dereference in\nf_{ecm,eem,hid,loopback,printer,rndis,serial,sourcesink,subset,tcm}\nby simply reusing the 5gbps config for 10gbps.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47270",
"url": "https://www.suse.com/security/cve/CVE-2021-47270"
},
{
"category": "external",
"summary": "SUSE Bug 1224997 for CVE-2021-47270",
"url": "https://bugzilla.suse.com/1224997"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47270"
},
{
"cve": "CVE-2021-47293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47293"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: act_skbmod: Skip non-Ethernet packets\n\nCurrently tcf_skbmod_act() assumes that packets use Ethernet as their L2\nprotocol, which is not always the case. As an example, for CAN devices:\n\n\t$ ip link add dev vcan0 type vcan\n\t$ ip link set up vcan0\n\t$ tc qdisc add dev vcan0 root handle 1: htb\n\t$ tc filter add dev vcan0 parent 1: protocol ip prio 10 \\\n\t\tmatchall action skbmod swap mac\n\nDoing the above silently corrupts all the packets. Do not perform skbmod\nactions for non-Ethernet packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47293",
"url": "https://www.suse.com/security/cve/CVE-2021-47293"
},
{
"category": "external",
"summary": "SUSE Bug 1224978 for CVE-2021-47293",
"url": "https://bugzilla.suse.com/1224978"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47293"
},
{
"cve": "CVE-2021-47294",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47294"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetrom: Decrease sock refcount when sock timers expire\n\nCommit 63346650c1a9 (\"netrom: switch to sock timer API\") switched to use\nsock timer API. It replaces mod_timer() by sk_reset_timer(), and\ndel_timer() by sk_stop_timer().\n\nFunction sk_reset_timer() will increase the refcount of sock if it is\ncalled on an inactive timer, hence, in case the timer expires, we need to\ndecrease the refcount ourselves in the handler, otherwise, the sock\nrefcount will be unbalanced and the sock will never be freed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47294",
"url": "https://www.suse.com/security/cve/CVE-2021-47294"
},
{
"category": "external",
"summary": "SUSE Bug 1224977 for CVE-2021-47294",
"url": "https://bugzilla.suse.com/1224977"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47294"
},
{
"cve": "CVE-2021-47297",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47297"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix uninit-value in caif_seqpkt_sendmsg\n\nWhen nr_segs equal to zero in iovec_from_user, the object\nmsg-\u003emsg_iter.iov is uninit stack memory in caif_seqpkt_sendmsg\nwhich is defined in ___sys_sendmsg. So we cann\u0027t just judge\nmsg-\u003emsg_iter.iov-\u003ebase directlly. We can use nr_segs to judge\nmsg in caif_seqpkt_sendmsg whether has data buffers.\n\n=====================================================\nBUG: KMSAN: uninit-value in caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542\nCall Trace:\n __dump_stack lib/dump_stack.c:77 [inline]\n dump_stack+0x1c9/0x220 lib/dump_stack.c:118\n kmsan_report+0xf7/0x1e0 mm/kmsan/kmsan_report.c:118\n __msan_warning+0x58/0xa0 mm/kmsan/kmsan_instr.c:215\n caif_seqpkt_sendmsg+0x693/0xf60 net/caif/caif_socket.c:542\n sock_sendmsg_nosec net/socket.c:652 [inline]\n sock_sendmsg net/socket.c:672 [inline]\n ____sys_sendmsg+0x12b6/0x1350 net/socket.c:2343\n ___sys_sendmsg net/socket.c:2397 [inline]\n __sys_sendmmsg+0x808/0xc90 net/socket.c:2480\n __compat_sys_sendmmsg net/compat.c:656 [inline]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47297",
"url": "https://www.suse.com/security/cve/CVE-2021-47297"
},
{
"category": "external",
"summary": "SUSE Bug 1224976 for CVE-2021-47297",
"url": "https://bugzilla.suse.com/1224976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47297"
},
{
"cve": "CVE-2021-47309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47309"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: validate lwtstate-\u003edata before returning from skb_tunnel_info()\n\nskb_tunnel_info() returns pointer of lwtstate-\u003edata as ip_tunnel_info\ntype without validation. lwtstate-\u003edata can have various types such as\nmpls_iptunnel_encap, etc and these are not compatible.\nSo skb_tunnel_info() should validate before returning that pointer.\n\nSplat looks like:\nBUG: KASAN: slab-out-of-bounds in vxlan_get_route+0x418/0x4b0 [vxlan]\nRead of size 2 at addr ffff888106ec2698 by task ping/811\n\nCPU: 1 PID: 811 Comm: ping Not tainted 5.13.0+ #1195\nCall Trace:\n dump_stack_lvl+0x56/0x7b\n print_address_description.constprop.8.cold.13+0x13/0x2ee\n ? vxlan_get_route+0x418/0x4b0 [vxlan]\n ? vxlan_get_route+0x418/0x4b0 [vxlan]\n kasan_report.cold.14+0x83/0xdf\n ? vxlan_get_route+0x418/0x4b0 [vxlan]\n vxlan_get_route+0x418/0x4b0 [vxlan]\n [ ... ]\n vxlan_xmit_one+0x148b/0x32b0 [vxlan]\n [ ... ]\n vxlan_xmit+0x25c5/0x4780 [vxlan]\n [ ... ]\n dev_hard_start_xmit+0x1ae/0x6e0\n __dev_queue_xmit+0x1f39/0x31a0\n [ ... ]\n neigh_xmit+0x2f9/0x940\n mpls_xmit+0x911/0x1600 [mpls_iptunnel]\n lwtunnel_xmit+0x18f/0x450\n ip_finish_output2+0x867/0x2040\n [ ... ]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47309",
"url": "https://www.suse.com/security/cve/CVE-2021-47309"
},
{
"category": "external",
"summary": "SUSE Bug 1224967 for CVE-2021-47309",
"url": "https://bugzilla.suse.com/1224967"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47309"
},
{
"cve": "CVE-2021-47328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47328"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi: Fix conn use after free during resets\n\nIf we haven\u0027t done a unbind target call we can race where\niscsi_conn_teardown wakes up the EH thread and then frees the conn while\nthose threads are still accessing the conn ehwait.\n\nWe can only do one TMF per session so this just moves the TMF fields from\nthe conn to the session. We can then rely on the\niscsi_session_teardown-\u003eiscsi_remove_session-\u003e__iscsi_unbind_session call\nto remove the target and it\u0027s devices, and know after that point there is\nno device or scsi-ml callout trying to access the session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47328",
"url": "https://www.suse.com/security/cve/CVE-2021-47328"
},
{
"category": "external",
"summary": "SUSE Bug 1225047 for CVE-2021-47328",
"url": "https://bugzilla.suse.com/1225047"
},
{
"category": "external",
"summary": "SUSE Bug 1225080 for CVE-2021-47328",
"url": "https://bugzilla.suse.com/1225080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47328"
},
{
"cve": "CVE-2021-47354",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47354"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Avoid data corruptions\n\nWait for all dependencies of a job to complete before\nkilling it to avoid data corruptions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47354",
"url": "https://www.suse.com/security/cve/CVE-2021-47354"
},
{
"category": "external",
"summary": "SUSE Bug 1225140 for CVE-2021-47354",
"url": "https://bugzilla.suse.com/1225140"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47354"
},
{
"cve": "CVE-2021-47372",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47372"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: macb: fix use after free on rmmod\n\nplat_dev-\u003edev-\u003eplatform_data is released by platform_device_unregister(),\nuse of pclk and hclk is a use-after-free. Since device unregister won\u0027t\nneed a clk device we adjust the function call sequence to fix this issue.\n\n[ 31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci]\n[ 31.275563] Freed by task 306:\n[ 30.276782] platform_device_release+0x25/0x80",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47372",
"url": "https://www.suse.com/security/cve/CVE-2021-47372"
},
{
"category": "external",
"summary": "SUSE Bug 1225184 for CVE-2021-47372",
"url": "https://bugzilla.suse.com/1225184"
},
{
"category": "external",
"summary": "SUSE Bug 1229946 for CVE-2021-47372",
"url": "https://bugzilla.suse.com/1229946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2021-47372"
},
{
"cve": "CVE-2021-47379",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47379"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd\n\nKASAN reports a use-after-free report when doing fuzz test:\n\n[693354.104835] ==================================================================\n[693354.105094] BUG: KASAN: use-after-free in bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105336] Read of size 4 at addr ffff888be0a35664 by task sh/1453338\n\n[693354.105607] CPU: 41 PID: 1453338 Comm: sh Kdump: loaded Not tainted 4.18.0-147\n[693354.105610] Hardware name: Huawei 2288H V5/BC11SPSCB0, BIOS 0.81 07/02/2018\n[693354.105612] Call Trace:\n[693354.105621] dump_stack+0xf1/0x19b\n[693354.105626] ? show_regs_print_info+0x5/0x5\n[693354.105634] ? printk+0x9c/0xc3\n[693354.105638] ? cpumask_weight+0x1f/0x1f\n[693354.105648] print_address_description+0x70/0x360\n[693354.105654] kasan_report+0x1b2/0x330\n[693354.105659] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105665] ? bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105670] bfq_io_set_weight_legacy+0xd3/0x160\n[693354.105675] ? bfq_cpd_init+0x20/0x20\n[693354.105683] cgroup_file_write+0x3aa/0x510\n[693354.105693] ? ___slab_alloc+0x507/0x540\n[693354.105698] ? cgroup_file_poll+0x60/0x60\n[693354.105702] ? 0xffffffff89600000\n[693354.105708] ? usercopy_abort+0x90/0x90\n[693354.105716] ? mutex_lock+0xef/0x180\n[693354.105726] kernfs_fop_write+0x1ab/0x280\n[693354.105732] ? cgroup_file_poll+0x60/0x60\n[693354.105738] vfs_write+0xe7/0x230\n[693354.105744] ksys_write+0xb0/0x140\n[693354.105749] ? __ia32_sys_read+0x50/0x50\n[693354.105760] do_syscall_64+0x112/0x370\n[693354.105766] ? syscall_return_slowpath+0x260/0x260\n[693354.105772] ? do_page_fault+0x9b/0x270\n[693354.105779] ? prepare_exit_to_usermode+0xf9/0x1a0\n[693354.105784] ? enter_from_user_mode+0x30/0x30\n[693354.105793] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.105875] Allocated by task 1453337:\n[693354.106001] kasan_kmalloc+0xa0/0xd0\n[693354.106006] kmem_cache_alloc_node_trace+0x108/0x220\n[693354.106010] bfq_pd_alloc+0x96/0x120\n[693354.106015] blkcg_activate_policy+0x1b7/0x2b0\n[693354.106020] bfq_create_group_hierarchy+0x1e/0x80\n[693354.106026] bfq_init_queue+0x678/0x8c0\n[693354.106031] blk_mq_init_sched+0x1f8/0x460\n[693354.106037] elevator_switch_mq+0xe1/0x240\n[693354.106041] elevator_switch+0x25/0x40\n[693354.106045] elv_iosched_store+0x1a1/0x230\n[693354.106049] queue_attr_store+0x78/0xb0\n[693354.106053] kernfs_fop_write+0x1ab/0x280\n[693354.106056] vfs_write+0xe7/0x230\n[693354.106060] ksys_write+0xb0/0x140\n[693354.106064] do_syscall_64+0x112/0x370\n[693354.106069] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106114] Freed by task 1453336:\n[693354.106225] __kasan_slab_free+0x130/0x180\n[693354.106229] kfree+0x90/0x1b0\n[693354.106233] blkcg_deactivate_policy+0x12c/0x220\n[693354.106238] bfq_exit_queue+0xf5/0x110\n[693354.106241] blk_mq_exit_sched+0x104/0x130\n[693354.106245] __elevator_exit+0x45/0x60\n[693354.106249] elevator_switch_mq+0xd6/0x240\n[693354.106253] elevator_switch+0x25/0x40\n[693354.106257] elv_iosched_store+0x1a1/0x230\n[693354.106261] queue_attr_store+0x78/0xb0\n[693354.106264] kernfs_fop_write+0x1ab/0x280\n[693354.106268] vfs_write+0xe7/0x230\n[693354.106271] ksys_write+0xb0/0x140\n[693354.106275] do_syscall_64+0x112/0x370\n[693354.106280] entry_SYSCALL_64_after_hwframe+0x65/0xca\n\n[693354.106329] The buggy address belongs to the object at ffff888be0a35580\n which belongs to the cache kmalloc-1k of size 1024\n[693354.106736] The buggy address is located 228 bytes inside of\n 1024-byte region [ffff888be0a35580, ffff888be0a35980)\n[693354.107114] The buggy address belongs to the page:\n[693354.107273] page:ffffea002f828c00 count:1 mapcount:0 mapping:ffff888107c17080 index:0x0 compound_mapcount: 0\n[693354.107606] flags: 0x17ffffc0008100(slab|head)\n[693354.107760] raw: 0017ffffc0008100 ffffea002fcbc808 ffffea0030bd3a08 ffff888107c17080\n[693354.108020] r\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47379",
"url": "https://www.suse.com/security/cve/CVE-2021-47379"
},
{
"category": "external",
"summary": "SUSE Bug 1225203 for CVE-2021-47379",
"url": "https://bugzilla.suse.com/1225203"
},
{
"category": "external",
"summary": "SUSE Bug 1225204 for CVE-2021-47379",
"url": "https://bugzilla.suse.com/1225204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47379"
},
{
"cve": "CVE-2021-47407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47407"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: x86: Handle SRCU initialization failure during page track init\n\nCheck the return of init_srcu_struct(), which can fail due to OOM, when\ninitializing the page track mechanism. Lack of checking leads to a NULL\npointer deref found by a modified syzkaller.\n\n[Move the call towards the beginning of kvm_arch_init_vm. - Paolo]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47407",
"url": "https://www.suse.com/security/cve/CVE-2021-47407"
},
{
"category": "external",
"summary": "SUSE Bug 1225306 for CVE-2021-47407",
"url": "https://bugzilla.suse.com/1225306"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47407"
},
{
"cve": "CVE-2021-47418",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47418"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: fix NULL deref in fifo_set_limit()\n\nsyzbot reported another NULL deref in fifo_set_limit() [1]\n\nI could repro the issue with :\n\nunshare -n\ntc qd add dev lo root handle 1:0 tbf limit 200000 burst 70000 rate 100Mbit\ntc qd replace dev lo parent 1:0 pfifo_fast\ntc qd change dev lo root handle 1:0 tbf limit 300000 burst 70000 rate 100Mbit\n\npfifo_fast does not have a change() operation.\nMake fifo_set_limit() more robust about this.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 1cf99067 P4D 1cf99067 PUD 7ca49067 PMD 0\nOops: 0010 [#1] PREEMPT SMP KASAN\nCPU: 1 PID: 14443 Comm: syz-executor959 Not tainted 5.15.0-rc3-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:0x0\nCode: Unable to access opcode bytes at RIP 0xffffffffffffffd6.\nRSP: 0018:ffffc9000e2f7310 EFLAGS: 00010246\nRAX: dffffc0000000000 RBX: ffffffff8d6ecc00 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: ffff888024c27910 RDI: ffff888071e34000\nRBP: ffff888071e34000 R08: 0000000000000001 R09: ffffffff8fcfb947\nR10: 0000000000000001 R11: 0000000000000000 R12: ffff888024c27910\nR13: ffff888071e34018 R14: 0000000000000000 R15: ffff88801ef74800\nFS: 00007f321d897700(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffffffffffffd6 CR3: 00000000722c3000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n fifo_set_limit net/sched/sch_fifo.c:242 [inline]\n fifo_set_limit+0x198/0x210 net/sched/sch_fifo.c:227\n tbf_change+0x6ec/0x16d0 net/sched/sch_tbf.c:418\n qdisc_change net/sched/sch_api.c:1332 [inline]\n tc_modify_qdisc+0xd9a/0x1a60 net/sched/sch_api.c:1634\n rtnetlink_rcv_msg+0x413/0xb80 net/core/rtnetlink.c:5572\n netlink_rcv_skb+0x153/0x420 net/netlink/af_netlink.c:2504\n netlink_unicast_kernel net/netlink/af_netlink.c:1314 [inline]\n netlink_unicast+0x533/0x7d0 net/netlink/af_netlink.c:1340\n netlink_sendmsg+0x86d/0xdb0 net/netlink/af_netlink.c:1929\n sock_sendmsg_nosec net/socket.c:704 [inline]\n sock_sendmsg+0xcf/0x120 net/socket.c:724\n ____sys_sendmsg+0x6e8/0x810 net/socket.c:2409\n ___sys_sendmsg+0xf3/0x170 net/socket.c:2463\n __sys_sendmsg+0xe5/0x1b0 net/socket.c:2492\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47418",
"url": "https://www.suse.com/security/cve/CVE-2021-47418"
},
{
"category": "external",
"summary": "SUSE Bug 1225337 for CVE-2021-47418",
"url": "https://bugzilla.suse.com/1225337"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47418"
},
{
"cve": "CVE-2021-47434",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47434"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxhci: Fix command ring pointer corruption while aborting a command\n\nThe command ring pointer is located at [6:63] bits of the command\nring control register (CRCR). All the control bits like command stop,\nabort are located at [0:3] bits. While aborting a command, we read the\nCRCR and set the abort bit and write to the CRCR. The read will always\ngive command ring pointer as all zeros. So we essentially write only\nthe control bits. Since we split the 64 bit write into two 32 bit writes,\nthere is a possibility of xHC command ring stopped before the upper\ndword (all zeros) is written. If that happens, xHC updates the upper\ndword of its internal command ring pointer with all zeros. Next time,\nwhen the command ring is restarted, we see xHC memory access failures.\nFix this issue by only writing to the lower dword of CRCR where all\ncontrol bits are located.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47434",
"url": "https://www.suse.com/security/cve/CVE-2021-47434"
},
{
"category": "external",
"summary": "SUSE Bug 1225232 for CVE-2021-47434",
"url": "https://bugzilla.suse.com/1225232"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47434"
},
{
"cve": "CVE-2021-47445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47445"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: Fix null pointer dereference on pointer edp\n\nThe initialization of pointer dev dereferences pointer edp before\nedp is null checked, so there is a potential null pointer deference\nissue. Fix this by only dereferencing edp after edp has been null\nchecked.\n\nAddresses-Coverity: (\"Dereference before null check\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47445",
"url": "https://www.suse.com/security/cve/CVE-2021-47445"
},
{
"category": "external",
"summary": "SUSE Bug 1225261 for CVE-2021-47445",
"url": "https://bugzilla.suse.com/1225261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47445"
},
{
"cve": "CVE-2021-47518",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47518"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done\n\nThe done() netlink callback nfc_genl_dump_ses_done() should check if\nreceived argument is non-NULL, because its allocation could fail earlier\nin dumpit() (nfc_genl_dump_ses()).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47518",
"url": "https://www.suse.com/security/cve/CVE-2021-47518"
},
{
"category": "external",
"summary": "SUSE Bug 1225372 for CVE-2021-47518",
"url": "https://bugzilla.suse.com/1225372"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47518"
},
{
"cve": "CVE-2021-47544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47544"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47544",
"url": "https://www.suse.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "SUSE Bug 1225463 for CVE-2021-47544",
"url": "https://bugzilla.suse.com/1225463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47544"
},
{
"cve": "CVE-2021-47566",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47566"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nproc/vmcore: fix clearing user buffer by properly using clear_user()\n\nTo clear a user buffer we cannot simply use memset, we have to use\nclear_user(). With a virtio-mem device that registers a vmcore_cb and\nhas some logically unplugged memory inside an added Linux memory block,\nI can easily trigger a BUG by copying the vmcore via \"cp\":\n\n systemd[1]: Starting Kdump Vmcore Save Service...\n kdump[420]: Kdump is using the default log level(3).\n kdump[453]: saving to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/\n kdump[458]: saving vmcore-dmesg.txt to /sysroot/var/crash/127.0.0.1-2021-11-11-14:59:22/\n kdump[465]: saving vmcore-dmesg.txt complete\n kdump[467]: saving vmcore\n BUG: unable to handle page fault for address: 00007f2374e01000\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0003) - permissions violation\n PGD 7a523067 P4D 7a523067 PUD 7a528067 PMD 7a525067 PTE 800000007048f867\n Oops: 0003 [#1] PREEMPT SMP NOPTI\n CPU: 0 PID: 468 Comm: cp Not tainted 5.15.0+ #6\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.14.0-27-g64f37cc530f1-prebuilt.qemu.org 04/01/2014\n RIP: 0010:read_from_oldmem.part.0.cold+0x1d/0x86\n Code: ff ff ff e8 05 ff fe ff e9 b9 e9 7f ff 48 89 de 48 c7 c7 38 3b 60 82 e8 f1 fe fe ff 83 fd 08 72 3c 49 8d 7d 08 4c 89 e9 89 e8 \u003c49\u003e c7 45 00 00 00 00 00 49 c7 44 05 f8 00 00 00 00 48 83 e7 f81\n RSP: 0018:ffffc9000073be08 EFLAGS: 00010212\n RAX: 0000000000001000 RBX: 00000000002fd000 RCX: 00007f2374e01000\n RDX: 0000000000000001 RSI: 00000000ffffdfff RDI: 00007f2374e01008\n RBP: 0000000000001000 R08: 0000000000000000 R09: ffffc9000073bc50\n R10: ffffc9000073bc48 R11: ffffffff829461a8 R12: 000000000000f000\n R13: 00007f2374e01000 R14: 0000000000000000 R15: ffff88807bd421e8\n FS: 00007f2374e12140(0000) GS:ffff88807f000000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f2374e01000 CR3: 000000007a4aa000 CR4: 0000000000350eb0\n Call Trace:\n read_vmcore+0x236/0x2c0\n proc_reg_read+0x55/0xa0\n vfs_read+0x95/0x190\n ksys_read+0x4f/0xc0\n do_syscall_64+0x3b/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nSome x86-64 CPUs have a CPU feature called \"Supervisor Mode Access\nPrevention (SMAP)\", which is used to detect wrong access from the kernel\nto user buffers like this: SMAP triggers a permissions violation on\nwrong access. In the x86-64 variant of clear_user(), SMAP is properly\nhandled via clac()+stac().\n\nTo fix, properly use clear_user() when we\u0027re dealing with a user buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47566",
"url": "https://www.suse.com/security/cve/CVE-2021-47566"
},
{
"category": "external",
"summary": "SUSE Bug 1225514 for CVE-2021-47566",
"url": "https://bugzilla.suse.com/1225514"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47566"
},
{
"cve": "CVE-2021-47571",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47571"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()\n\nThe free_rtllib() function frees the \"dev\" pointer so there is use\nafter free on the next line. Re-arrange things to avoid that.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47571",
"url": "https://www.suse.com/security/cve/CVE-2021-47571"
},
{
"category": "external",
"summary": "SUSE Bug 1225518 for CVE-2021-47571",
"url": "https://bugzilla.suse.com/1225518"
},
{
"category": "external",
"summary": "SUSE Bug 1227551 for CVE-2021-47571",
"url": "https://bugzilla.suse.com/1227551"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2021-47571"
},
{
"cve": "CVE-2021-47576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47576"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()\n\nIn resp_mode_select() sanity check the block descriptor len to avoid UAF.\n\nBUG: KASAN: use-after-free in resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509\nRead of size 1 at addr ffff888026670f50 by task scsicmd/15032\n\nCPU: 1 PID: 15032 Comm: scsicmd Not tainted 5.15.0-01d0625 #15\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x89/0xb5 lib/dump_stack.c:107\n print_address_description.constprop.9+0x28/0x160 mm/kasan/report.c:257\n kasan_report.cold.14+0x7d/0x117 mm/kasan/report.c:443\n __asan_report_load1_noabort+0x14/0x20 mm/kasan/report_generic.c:306\n resp_mode_select+0xa4c/0xb40 drivers/scsi/scsi_debug.c:2509\n schedule_resp+0x4af/0x1a10 drivers/scsi/scsi_debug.c:5483\n scsi_debug_queuecommand+0x8c9/0x1e70 drivers/scsi/scsi_debug.c:7537\n scsi_queue_rq+0x16b4/0x2d10 drivers/scsi/scsi_lib.c:1521\n blk_mq_dispatch_rq_list+0xb9b/0x2700 block/blk-mq.c:1640\n __blk_mq_sched_dispatch_requests+0x28f/0x590 block/blk-mq-sched.c:325\n blk_mq_sched_dispatch_requests+0x105/0x190 block/blk-mq-sched.c:358\n __blk_mq_run_hw_queue+0xe5/0x150 block/blk-mq.c:1762\n __blk_mq_delay_run_hw_queue+0x4f8/0x5c0 block/blk-mq.c:1839\n blk_mq_run_hw_queue+0x18d/0x350 block/blk-mq.c:1891\n blk_mq_sched_insert_request+0x3db/0x4e0 block/blk-mq-sched.c:474\n blk_execute_rq_nowait+0x16b/0x1c0 block/blk-exec.c:63\n sg_common_write.isra.18+0xeb3/0x2000 drivers/scsi/sg.c:837\n sg_new_write.isra.19+0x570/0x8c0 drivers/scsi/sg.c:775\n sg_ioctl_common+0x14d6/0x2710 drivers/scsi/sg.c:941\n sg_ioctl+0xa2/0x180 drivers/scsi/sg.c:1166\n __x64_sys_ioctl+0x19d/0x220 fs/ioctl.c:52\n do_syscall_64+0x3a/0x80 arch/x86/entry/common.c:50\n entry_SYSCALL_64_after_hwframe+0x44/0xae arch/x86/entry/entry_64.S:113",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47576",
"url": "https://www.suse.com/security/cve/CVE-2021-47576"
},
{
"category": "external",
"summary": "SUSE Bug 1226537 for CVE-2021-47576",
"url": "https://bugzilla.suse.com/1226537"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "low"
}
],
"title": "CVE-2021-47576"
},
{
"cve": "CVE-2021-47587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47587"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: systemport: Add global locking for descriptor lifecycle\n\nThe descriptor list is a shared resource across all of the transmit queues, and\nthe locking mechanism used today only protects concurrency across a given\ntransmit queue between the transmit and reclaiming. This creates an opportunity\nfor the SYSTEMPORT hardware to work on corrupted descriptors if we have\nmultiple producers at once which is the case when using multiple transmit\nqueues.\n\nThis was particularly noticeable when using multiple flows/transmit queues and\nit showed up in interesting ways in that UDP packets would get a correct UDP\nheader checksum being calculated over an incorrect packet length. Similarly TCP\npackets would get an equally correct checksum computed by the hardware over an\nincorrect packet length.\n\nThe SYSTEMPORT hardware maintains an internal descriptor list that it re-arranges\nwhen the driver produces a new descriptor anytime it writes to the\nWRITE_PORT_{HI,LO} registers, there is however some delay in the hardware to\nre-organize its descriptors and it is possible that concurrent TX queues\neventually break this internal allocation scheme to the point where the\nlength/status part of the descriptor gets used for an incorrect data buffer.\n\nThe fix is to impose a global serialization for all TX queues in the short\nsection where we are writing to the WRITE_PORT_{HI,LO} registers which solves\nthe corruption even with multiple concurrent TX queues being used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47587",
"url": "https://www.suse.com/security/cve/CVE-2021-47587"
},
{
"category": "external",
"summary": "SUSE Bug 1226567 for CVE-2021-47587",
"url": "https://bugzilla.suse.com/1226567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47587"
},
{
"cve": "CVE-2021-47589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47589"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigbvf: fix double free in `igbvf_probe`\n\nIn `igbvf_probe`, if register_netdev() fails, the program will go to\nlabel err_hw_init, and then to label err_ioremap. In free_netdev() which\nis just below label err_ioremap, there is `list_for_each_entry_safe` and\n`netif_napi_del` which aims to delete all entries in `dev-\u003enapi_list`.\nThe program has added an entry `adapter-\u003erx_ring-\u003enapi` which is added by\n`netif_napi_add` in igbvf_alloc_queues(). However, adapter-\u003erx_ring has\nbeen freed below label err_hw_init. So this a UAF.\n\nIn terms of how to patch the problem, we can refer to igbvf_remove() and\ndelete the entry before `adapter-\u003erx_ring`.\n\nThe KASAN logs are as follows:\n\n[ 35.126075] BUG: KASAN: use-after-free in free_netdev+0x1fd/0x450\n[ 35.127170] Read of size 8 at addr ffff88810126d990 by task modprobe/366\n[ 35.128360]\n[ 35.128643] CPU: 1 PID: 366 Comm: modprobe Not tainted 5.15.0-rc2+ #14\n[ 35.129789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014\n[ 35.131749] Call Trace:\n[ 35.132199] dump_stack_lvl+0x59/0x7b\n[ 35.132865] print_address_description+0x7c/0x3b0\n[ 35.133707] ? free_netdev+0x1fd/0x450\n[ 35.134378] __kasan_report+0x160/0x1c0\n[ 35.135063] ? free_netdev+0x1fd/0x450\n[ 35.135738] kasan_report+0x4b/0x70\n[ 35.136367] free_netdev+0x1fd/0x450\n[ 35.137006] igbvf_probe+0x121d/0x1a10 [igbvf]\n[ 35.137808] ? igbvf_vlan_rx_add_vid+0x100/0x100 [igbvf]\n[ 35.138751] local_pci_probe+0x13c/0x1f0\n[ 35.139461] pci_device_probe+0x37e/0x6c0\n[ 35.165526]\n[ 35.165806] Allocated by task 366:\n[ 35.166414] ____kasan_kmalloc+0xc4/0xf0\n[ 35.167117] foo_kmem_cache_alloc_trace+0x3c/0x50 [igbvf]\n[ 35.168078] igbvf_probe+0x9c5/0x1a10 [igbvf]\n[ 35.168866] local_pci_probe+0x13c/0x1f0\n[ 35.169565] pci_device_probe+0x37e/0x6c0\n[ 35.179713]\n[ 35.179993] Freed by task 366:\n[ 35.180539] kasan_set_track+0x4c/0x80\n[ 35.181211] kasan_set_free_info+0x1f/0x40\n[ 35.181942] ____kasan_slab_free+0x103/0x140\n[ 35.182703] kfree+0xe3/0x250\n[ 35.183239] igbvf_probe+0x1173/0x1a10 [igbvf]\n[ 35.184040] local_pci_probe+0x13c/0x1f0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47589",
"url": "https://www.suse.com/security/cve/CVE-2021-47589"
},
{
"category": "external",
"summary": "SUSE Bug 1226557 for CVE-2021-47589",
"url": "https://bugzilla.suse.com/1226557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47589"
},
{
"cve": "CVE-2021-47600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47600"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm btree remove: fix use after free in rebalance_children()\n\nMove dm_tm_unlock() after dm_tm_dec().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47600",
"url": "https://www.suse.com/security/cve/CVE-2021-47600"
},
{
"category": "external",
"summary": "SUSE Bug 1226575 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1226575"
},
{
"category": "external",
"summary": "SUSE Bug 1227472 for CVE-2021-47600",
"url": "https://bugzilla.suse.com/1227472"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47600"
},
{
"cve": "CVE-2021-47602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47602"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmac80211: track only QoS data frames for admission control\n\nFor admission control, obviously all of that only works for\nQoS data frames, otherwise we cannot even access the QoS\nfield in the header.\n\nSyzbot reported (see below) an uninitialized value here due\nto a status of a non-QoS nullfunc packet, which isn\u0027t even\nlong enough to contain the QoS header.\n\nFix this to only do anything for QoS data packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47602",
"url": "https://www.suse.com/security/cve/CVE-2021-47602"
},
{
"category": "external",
"summary": "SUSE Bug 1226554 for CVE-2021-47602",
"url": "https://bugzilla.suse.com/1226554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47602"
},
{
"cve": "CVE-2021-47603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47603"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naudit: improve robustness of the audit queue handling\n\nIf the audit daemon were ever to get stuck in a stopped state the\nkernel\u0027s kauditd_thread() could get blocked attempting to send audit\nrecords to the userspace audit daemon. With the kernel thread\nblocked it is possible that the audit queue could grow unbounded as\ncertain audit record generating events must be exempt from the queue\nlimits else the system enter a deadlock state.\n\nThis patch resolves this problem by lowering the kernel thread\u0027s\nsocket sending timeout from MAX_SCHEDULE_TIMEOUT to HZ/10 and tweaks\nthe kauditd_send_queue() function to better manage the various audit\nqueues when connection problems occur between the kernel and the\naudit daemon. With this patch, the backlog may temporarily grow\nbeyond the defined limits when the audit daemon is stopped and the\nsystem is under heavy audit pressure, but kauditd_thread() will\ncontinue to make progress and drain the queues as it would for other\nconnection problems. For example, with the audit daemon put into a\nstopped state and the system configured to audit every syscall it\nwas still possible to shutdown the system without a kernel panic,\ndeadlock, etc.; granted, the system was slow to shutdown but that is\nto be expected given the extreme pressure of recording every syscall.\n\nThe timeout value of HZ/10 was chosen primarily through\nexperimentation and this developer\u0027s \"gut feeling\". There is likely\nno one perfect value, but as this scenario is limited in scope (root\nprivileges would be needed to send SIGSTOP to the audit daemon), it\nis likely not worth exposing this as a tunable at present. This can\nalways be done at a later date if it proves necessary.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47603",
"url": "https://www.suse.com/security/cve/CVE-2021-47603"
},
{
"category": "external",
"summary": "SUSE Bug 1226577 for CVE-2021-47603",
"url": "https://bugzilla.suse.com/1226577"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47603"
},
{
"cve": "CVE-2021-47609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47609"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: arm_scpi: Fix string overflow in SCPI genpd driver\n\nWithout the bound checks for scpi_pd-\u003ename, it could result in the buffer\noverflow when copying the SCPI device name from the corresponding device\ntree node as the name string is set at maximum size of 30.\n\nLet us fix it by using devm_kasprintf so that the string buffer is\nallocated dynamically.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47609",
"url": "https://www.suse.com/security/cve/CVE-2021-47609"
},
{
"category": "external",
"summary": "SUSE Bug 1226562 for CVE-2021-47609",
"url": "https://bugzilla.suse.com/1226562"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47609"
},
{
"cve": "CVE-2021-47617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-47617"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: pciehp: Fix infinite loop in IRQ handler upon power fault\n\nThe Power Fault Detected bit in the Slot Status register differs from\nall other hotplug events in that it is sticky: It can only be cleared\nafter turning off slot power. Per PCIe r5.0, sec. 6.7.1.8:\n\n If a power controller detects a main power fault on the hot-plug slot,\n it must automatically set its internal main power fault latch [...].\n The main power fault latch is cleared when software turns off power to\n the hot-plug slot.\n\nThe stickiness used to cause interrupt storms and infinite loops which\nwere fixed in 2009 by commits 5651c48cfafe (\"PCI pciehp: fix power fault\ninterrupt storm problem\") and 99f0169c17f3 (\"PCI: pciehp: enable\nsoftware notification on empty slots\").\n\nUnfortunately in 2020 the infinite loop issue was inadvertently\nreintroduced by commit 8edf5332c393 (\"PCI: pciehp: Fix MSI interrupt\nrace\"): The hardirq handler pciehp_isr() clears the PFD bit until\npciehp\u0027s power_fault_detected flag is set. That happens in the IRQ\nthread pciehp_ist(), which never learns of the event because the hardirq\nhandler is stuck in an infinite loop. Fix by setting the\npower_fault_detected flag already in the hardirq handler.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-47617",
"url": "https://www.suse.com/security/cve/CVE-2021-47617"
},
{
"category": "external",
"summary": "SUSE Bug 1226614 for CVE-2021-47617",
"url": "https://bugzilla.suse.com/1226614"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2021-47617"
},
{
"cve": "CVE-2022-0435",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0435"
}
],
"notes": [
{
"category": "general",
"text": "A stack overflow flaw was found in the Linux kernel\u0027s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0435",
"url": "https://www.suse.com/security/cve/CVE-2022-0435"
},
{
"category": "external",
"summary": "SUSE Bug 1195254 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1195254"
},
{
"category": "external",
"summary": "SUSE Bug 1195308 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1195308"
},
{
"category": "external",
"summary": "SUSE Bug 1226672 for CVE-2022-0435",
"url": "https://bugzilla.suse.com/1226672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2022-0435"
},
{
"cve": "CVE-2022-22942",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22942"
}
],
"notes": [
{
"category": "general",
"text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22942",
"url": "https://www.suse.com/security/cve/CVE-2022-22942"
},
{
"category": "external",
"summary": "SUSE Bug 1195065 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195065"
},
{
"category": "external",
"summary": "SUSE Bug 1195951 for CVE-2022-22942",
"url": "https://bugzilla.suse.com/1195951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-22942"
},
{
"cve": "CVE-2022-48711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48711"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: improve size validations for received domain records\n\nThe function tipc_mon_rcv() allows a node to receive and process\ndomain_record structs from peer nodes to track their views of the\nnetwork topology.\n\nThis patch verifies that the number of members in a received domain\nrecord does not exceed the limit defined by MAX_MON_DOMAIN, something\nthat may otherwise lead to a stack overflow.\n\ntipc_mon_rcv() is called from the function tipc_link_proto_rcv(), where\nwe are reading a 32 bit message data length field into a uint16. To\navert any risk of bit overflow, we add an extra sanity check for this in\nthat function. We cannot see that happen with the current code, but\nfuture designers being unaware of this risk, may introduce it by\nallowing delivery of very large (\u003e 64k) sk buffers from the bearer\nlayer. This potential problem was identified by Eric Dumazet.\n\nThis fixes CVE-2022-0435",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48711",
"url": "https://www.suse.com/security/cve/CVE-2022-48711"
},
{
"category": "external",
"summary": "SUSE Bug 1226672 for CVE-2022-48711",
"url": "https://bugzilla.suse.com/1226672"
},
{
"category": "external",
"summary": "SUSE Bug 1227473 for CVE-2022-48711",
"url": "https://bugzilla.suse.com/1227473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48711"
},
{
"cve": "CVE-2022-48715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48715"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Make bnx2fc_recv_frame() mp safe\n\nRunning tests with a debug kernel shows that bnx2fc_recv_frame() is\nmodifying the per_cpu lport stats counters in a non-mpsafe way. Just boot\na debug kernel and run the bnx2fc driver with the hardware enabled.\n\n[ 1391.699147] BUG: using smp_processor_id() in preemptible [00000000] code: bnx2fc_\n[ 1391.699160] caller is bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]\n[ 1391.699174] CPU: 2 PID: 4355 Comm: bnx2fc_l2_threa Kdump: loaded Tainted: G B\n[ 1391.699180] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013\n[ 1391.699183] Call Trace:\n[ 1391.699188] dump_stack_lvl+0x57/0x7d\n[ 1391.699198] check_preemption_disabled+0xc8/0xd0\n[ 1391.699205] bnx2fc_recv_frame+0xbf9/0x1760 [bnx2fc]\n[ 1391.699215] ? do_raw_spin_trylock+0xb5/0x180\n[ 1391.699221] ? bnx2fc_npiv_create_vports.isra.0+0x4e0/0x4e0 [bnx2fc]\n[ 1391.699229] ? bnx2fc_l2_rcv_thread+0xb7/0x3a0 [bnx2fc]\n[ 1391.699240] bnx2fc_l2_rcv_thread+0x1af/0x3a0 [bnx2fc]\n[ 1391.699250] ? bnx2fc_ulp_init+0xc0/0xc0 [bnx2fc]\n[ 1391.699258] kthread+0x364/0x420\n[ 1391.699263] ? _raw_spin_unlock_irq+0x24/0x50\n[ 1391.699268] ? set_kthread_struct+0x100/0x100\n[ 1391.699273] ret_from_fork+0x22/0x30\n\nRestore the old get_cpu/put_cpu code with some modifications to reduce the\nsize of the critical section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48715",
"url": "https://www.suse.com/security/cve/CVE-2022-48715"
},
{
"category": "external",
"summary": "SUSE Bug 1226621 for CVE-2022-48715",
"url": "https://bugzilla.suse.com/1226621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "low"
}
],
"title": "CVE-2022-48715"
},
{
"cve": "CVE-2022-48722",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48722"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ieee802154: ca8210: Stop leaking skb\u0027s\n\nUpon error the ieee802154_xmit_complete() helper is not called. Only\nieee802154_wake_queue() is called manually. We then leak the skb\nstructure.\n\nFree the skb structure upon error before returning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48722",
"url": "https://www.suse.com/security/cve/CVE-2022-48722"
},
{
"category": "external",
"summary": "SUSE Bug 1226619 for CVE-2022-48722",
"url": "https://bugzilla.suse.com/1226619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48722"
},
{
"cve": "CVE-2022-48732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48732"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/nouveau: fix off by one in BIOS boundary checking\n\nBounds checking when parsing init scripts embedded in the BIOS reject\naccess to the last byte. This causes driver initialization to fail on\nApple eMac\u0027s with GeForce 2 MX GPUs, leaving the system with no working\nconsole.\n\nThis is probably only seen on OpenFirmware machines like PowerPC Macs\nbecause the BIOS image provided by OF is only the used parts of the ROM,\nnot a power-of-two blocks read from PCI directly so PCs always have\nempty bytes at the end that are never accessed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48732",
"url": "https://www.suse.com/security/cve/CVE-2022-48732"
},
{
"category": "external",
"summary": "SUSE Bug 1226716 for CVE-2022-48732",
"url": "https://bugzilla.suse.com/1226716"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48732"
},
{
"cve": "CVE-2022-48733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48733"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix use-after-free after failure to create a snapshot\n\nAt ioctl.c:create_snapshot(), we allocate a pending snapshot structure and\nthen attach it to the transaction\u0027s list of pending snapshots. After that\nwe call btrfs_commit_transaction(), and if that returns an error we jump\nto \u0027fail\u0027 label, where we kfree() the pending snapshot structure. This can\nresult in a later use-after-free of the pending snapshot:\n\n1) We allocated the pending snapshot and added it to the transaction\u0027s\n list of pending snapshots;\n\n2) We call btrfs_commit_transaction(), and it fails either at the first\n call to btrfs_run_delayed_refs() or btrfs_start_dirty_block_groups().\n In both cases, we don\u0027t abort the transaction and we release our\n transaction handle. We jump to the \u0027fail\u0027 label and free the pending\n snapshot structure. We return with the pending snapshot still in the\n transaction\u0027s list;\n\n3) Another task commits the transaction. This time there\u0027s no error at\n all, and then during the transaction commit it accesses a pointer\n to the pending snapshot structure that the snapshot creation task\n has already freed, resulting in a user-after-free.\n\nThis issue could actually be detected by smatch, which produced the\nfollowing warning:\n\n fs/btrfs/ioctl.c:843 create_snapshot() warn: \u0027\u0026pending_snapshot-\u003elist\u0027 not removed from list\n\nSo fix this by not having the snapshot creation ioctl directly add the\npending snapshot to the transaction\u0027s list. Instead add the pending\nsnapshot to the transaction handle, and then at btrfs_commit_transaction()\nwe add the snapshot to the list only when we can guarantee that any error\nreturned after that point will result in a transaction abort, in which\ncase the ioctl code can safely free the pending snapshot and no one can\naccess it anymore.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48733",
"url": "https://www.suse.com/security/cve/CVE-2022-48733"
},
{
"category": "external",
"summary": "SUSE Bug 1226718 for CVE-2022-48733",
"url": "https://bugzilla.suse.com/1226718"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48733"
},
{
"cve": "CVE-2022-48740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48740"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nselinux: fix double free of cond_list on error paths\n\nOn error path from cond_read_list() and duplicate_policydb_cond_list()\nthe cond_list_destroy() gets called a second time in caller functions,\nresulting in NULL pointer deref. Fix this by resetting the\ncond_list_len to 0 in cond_list_destroy(), making subsequent calls a\nnoop.\n\nAlso consistently reset the cond_list pointer to NULL after freeing.\n\n[PM: fix line lengths in the description]",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48740",
"url": "https://www.suse.com/security/cve/CVE-2022-48740"
},
{
"category": "external",
"summary": "SUSE Bug 1226699 for CVE-2022-48740",
"url": "https://bugzilla.suse.com/1226699"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48740"
},
{
"cve": "CVE-2022-48743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48743"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: amd-xgbe: Fix skb data length underflow\n\nThere will be BUG_ON() triggered in include/linux/skbuff.h leading to\nintermittent kernel panic, when the skb length underflow is detected.\n\nFix this by dropping the packet if such length underflows are seen\nbecause of inconsistencies in the hardware descriptors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48743",
"url": "https://www.suse.com/security/cve/CVE-2022-48743"
},
{
"category": "external",
"summary": "SUSE Bug 1226705 for CVE-2022-48743",
"url": "https://bugzilla.suse.com/1226705"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48743"
},
{
"cve": "CVE-2022-48754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48754"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphylib: fix potential use-after-free\n\nCommit bafbdd527d56 (\"phylib: Add device reset GPIO support\") added call\nto phy_device_reset(phydev) after the put_device() call in phy_detach().\n\nThe comment before the put_device() call says that the phydev might go\naway with put_device().\n\nFix potential use-after-free by calling phy_device_reset() before\nput_device().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48754",
"url": "https://www.suse.com/security/cve/CVE-2022-48754"
},
{
"category": "external",
"summary": "SUSE Bug 1226692 for CVE-2022-48754",
"url": "https://bugzilla.suse.com/1226692"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48754"
},
{
"cve": "CVE-2022-48756",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48756"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/dsi: invalid parameter check in msm_dsi_phy_enable\n\nThe function performs a check on the \"phy\" input parameter, however, it\nis used before the check.\n\nInitialize the \"dev\" variable after the sanity check to avoid a possible\nNULL pointer dereference.\n\nAddresses-Coverity-ID: 1493860 (\"Null pointer dereference\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48756",
"url": "https://www.suse.com/security/cve/CVE-2022-48756"
},
{
"category": "external",
"summary": "SUSE Bug 1226698 for CVE-2022-48756",
"url": "https://bugzilla.suse.com/1226698"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48756"
},
{
"cve": "CVE-2022-48758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48758"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()\n\nThe bnx2fc_destroy() functions are removing the interface before calling\ndestroy_work. This results multiple WARNings from sysfs_remove_group() as\nthe controller rport device attributes are removed too early.\n\nReplace the fcoe_port\u0027s destroy_work queue. It\u0027s not needed.\n\nThe problem is easily reproducible with the following steps.\n\nExample:\n\n $ dmesg -w \u0026\n $ systemctl enable --now fcoe\n $ fipvlan -s -c ens2f1\n $ fcoeadm -d ens2f1.802\n [ 583.464488] host2: libfc: Link down on port (7500a1)\n [ 583.472651] bnx2fc: 7500a1 - rport not created Yet!!\n [ 583.490468] ------------[ cut here ]------------\n [ 583.538725] sysfs group \u0027power\u0027 not found for kobject \u0027rport-2:0-0\u0027\n [ 583.568814] WARNING: CPU: 3 PID: 192 at fs/sysfs/group.c:279 sysfs_remove_group+0x6f/0x80\n [ 583.607130] Modules linked in: dm_service_time 8021q garp mrp stp llc bnx2fc cnic uio rpcsec_gss_krb5 auth_rpcgss nfsv4 ...\n [ 583.942994] CPU: 3 PID: 192 Comm: kworker/3:2 Kdump: loaded Not tainted 5.14.0-39.el9.x86_64 #1\n [ 583.984105] Hardware name: HP ProLiant DL120 G7, BIOS J01 07/01/2013\n [ 584.016535] Workqueue: fc_wq_2 fc_rport_final_delete [scsi_transport_fc]\n [ 584.050691] RIP: 0010:sysfs_remove_group+0x6f/0x80\n [ 584.074725] Code: ff 5b 48 89 ef 5d 41 5c e9 ee c0 ff ff 48 89 ef e8 f6 b8 ff ff eb d1 49 8b 14 24 48 8b 33 48 c7 c7 ...\n [ 584.162586] RSP: 0018:ffffb567c15afdc0 EFLAGS: 00010282\n [ 584.188225] RAX: 0000000000000000 RBX: ffffffff8eec4220 RCX: 0000000000000000\n [ 584.221053] RDX: ffff8c1586ce84c0 RSI: ffff8c1586cd7cc0 RDI: ffff8c1586cd7cc0\n [ 584.255089] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffb567c15afc00\n [ 584.287954] R10: ffffb567c15afbf8 R11: ffffffff8fbe7f28 R12: ffff8c1486326400\n [ 584.322356] R13: ffff8c1486326480 R14: ffff8c1483a4a000 R15: 0000000000000004\n [ 584.355379] FS: 0000000000000000(0000) GS:ffff8c1586cc0000(0000) knlGS:0000000000000000\n [ 584.394419] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n [ 584.421123] CR2: 00007fe95a6f7840 CR3: 0000000107674002 CR4: 00000000000606e0\n [ 584.454888] Call Trace:\n [ 584.466108] device_del+0xb2/0x3e0\n [ 584.481701] device_unregister+0x13/0x60\n [ 584.501306] bsg_unregister_queue+0x5b/0x80\n [ 584.522029] bsg_remove_queue+0x1c/0x40\n [ 584.541884] fc_rport_final_delete+0xf3/0x1d0 [scsi_transport_fc]\n [ 584.573823] process_one_work+0x1e3/0x3b0\n [ 584.592396] worker_thread+0x50/0x3b0\n [ 584.609256] ? rescuer_thread+0x370/0x370\n [ 584.628877] kthread+0x149/0x170\n [ 584.643673] ? set_kthread_struct+0x40/0x40\n [ 584.662909] ret_from_fork+0x22/0x30\n [ 584.680002] ---[ end trace 53575ecefa942ece ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48758",
"url": "https://www.suse.com/security/cve/CVE-2022-48758"
},
{
"category": "external",
"summary": "SUSE Bug 1226708 for CVE-2022-48758",
"url": "https://bugzilla.suse.com/1226708"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48758"
},
{
"cve": "CVE-2022-48759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48759"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev\n\nstruct rpmsg_ctrldev contains a struct cdev. The current code frees\nthe rpmsg_ctrldev struct in rpmsg_ctrldev_release_device(), but the\ncdev is a managed object, therefore its release is not predictable\nand the rpmsg_ctrldev could be freed before the cdev is entirely\nreleased, as in the backtrace below.\n\n[ 93.625603] ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x7c\n[ 93.636115] WARNING: CPU: 0 PID: 12 at lib/debugobjects.c:488 debug_print_object+0x13c/0x1b0\n[ 93.644799] Modules linked in: veth xt_cgroup xt_MASQUERADE rfcomm algif_hash algif_skcipher af_alg uinput ip6table_nat fuse uvcvideo videobuf2_vmalloc venus_enc venus_dec videobuf2_dma_contig hci_uart btandroid btqca snd_soc_rt5682_i2c bluetooth qcom_spmi_temp_alarm snd_soc_rt5682v\n[ 93.715175] CPU: 0 PID: 12 Comm: kworker/0:1 Tainted: G B 5.4.163-lockdep #26\n[ 93.723855] Hardware name: Google Lazor (rev3 - 8) with LTE (DT)\n[ 93.730055] Workqueue: events kobject_delayed_cleanup\n[ 93.735271] pstate: 60c00009 (nZCv daif +PAN +UAO)\n[ 93.740216] pc : debug_print_object+0x13c/0x1b0\n[ 93.744890] lr : debug_print_object+0x13c/0x1b0\n[ 93.749555] sp : ffffffacf5bc7940\n[ 93.752978] x29: ffffffacf5bc7940 x28: dfffffd000000000\n[ 93.758448] x27: ffffffacdb11a800 x26: dfffffd000000000\n[ 93.763916] x25: ffffffd0734f856c x24: dfffffd000000000\n[ 93.769389] x23: 0000000000000000 x22: ffffffd0733c35b0\n[ 93.774860] x21: ffffffd0751994a0 x20: ffffffd075ec27c0\n[ 93.780338] x19: ffffffd075199100 x18: 00000000000276e0\n[ 93.785814] x17: 0000000000000000 x16: dfffffd000000000\n[ 93.791291] x15: ffffffffffffffff x14: 6e6968207473696c\n[ 93.796768] x13: 0000000000000000 x12: ffffffd075e2b000\n[ 93.802244] x11: 0000000000000001 x10: 0000000000000000\n[ 93.807723] x9 : d13400dff1921900 x8 : d13400dff1921900\n[ 93.813200] x7 : 0000000000000000 x6 : 0000000000000000\n[ 93.818676] x5 : 0000000000000080 x4 : 0000000000000000\n[ 93.824152] x3 : ffffffd0732a0fa4 x2 : 0000000000000001\n[ 93.829628] x1 : ffffffacf5bc7580 x0 : 0000000000000061\n[ 93.835104] Call trace:\n[ 93.837644] debug_print_object+0x13c/0x1b0\n[ 93.841963] __debug_check_no_obj_freed+0x25c/0x3c0\n[ 93.846987] debug_check_no_obj_freed+0x18/0x20\n[ 93.851669] slab_free_freelist_hook+0xbc/0x1e4\n[ 93.856346] kfree+0xfc/0x2f4\n[ 93.859416] rpmsg_ctrldev_release_device+0x78/0xb8\n[ 93.864445] device_release+0x84/0x168\n[ 93.868310] kobject_cleanup+0x12c/0x298\n[ 93.872356] kobject_delayed_cleanup+0x10/0x18\n[ 93.876948] process_one_work+0x578/0x92c\n[ 93.881086] worker_thread+0x804/0xcf8\n[ 93.884963] kthread+0x2a8/0x314\n[ 93.888303] ret_from_fork+0x10/0x18\n\nThe cdev_device_add/del() API was created to address this issue (see\ncommit \u0027233ed09d7fda (\"chardev: add helper function to register char\ndevs with a struct device\")\u0027), use it instead of cdev add/del().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48759",
"url": "https://www.suse.com/security/cve/CVE-2022-48759"
},
{
"category": "external",
"summary": "SUSE Bug 1226711 for CVE-2022-48759",
"url": "https://bugzilla.suse.com/1226711"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48759"
},
{
"cve": "CVE-2022-48760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48760"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: core: Fix hang in usb_kill_urb by adding memory barriers\n\nThe syzbot fuzzer has identified a bug in which processes hang waiting\nfor usb_kill_urb() to return. It turns out the issue is not unlinking\nthe URB; that works just fine. Rather, the problem arises when the\nwakeup notification that the URB has completed is not received.\n\nThe reason is memory-access ordering on SMP systems. In outline form,\nusb_kill_urb() and __usb_hcd_giveback_urb() operating concurrently on\ndifferent CPUs perform the following actions:\n\nCPU 0\t\t\t\t\tCPU 1\n----------------------------\t\t---------------------------------\nusb_kill_urb():\t\t\t\t__usb_hcd_giveback_urb():\n ...\t\t\t\t\t ...\n atomic_inc(\u0026urb-\u003ereject);\t\t atomic_dec(\u0026urb-\u003euse_count);\n ...\t\t\t\t\t ...\n wait_event(usb_kill_urb_queue,\n\tatomic_read(\u0026urb-\u003euse_count) == 0);\n\t\t\t\t\t if (atomic_read(\u0026urb-\u003ereject))\n\t\t\t\t\t\twake_up(\u0026usb_kill_urb_queue);\n\nConfining your attention to urb-\u003ereject and urb-\u003euse_count, you can\nsee that the overall pattern of accesses on CPU 0 is:\n\n\twrite urb-\u003ereject, then read urb-\u003euse_count;\n\nwhereas the overall pattern of accesses on CPU 1 is:\n\n\twrite urb-\u003euse_count, then read urb-\u003ereject.\n\nThis pattern is referred to in memory-model circles as SB (for \"Store\nBuffering\"), and it is well known that without suitable enforcement of\nthe desired order of accesses -- in the form of memory barriers -- it\nis entirely possible for one or both CPUs to execute their reads ahead\nof their writes. The end result will be that sometimes CPU 0 sees the\nold un-decremented value of urb-\u003euse_count while CPU 1 sees the old\nun-incremented value of urb-\u003ereject. Consequently CPU 0 ends up on\nthe wait queue and never gets woken up, leading to the observed hang\nin usb_kill_urb().\n\nThe same pattern of accesses occurs in usb_poison_urb() and the\nfailure pathway of usb_hcd_submit_urb().\n\nThe problem is fixed by adding suitable memory barriers. To provide\nproper memory-access ordering in the SB pattern, a full barrier is\nrequired on both CPUs. The atomic_inc() and atomic_dec() accesses\nthemselves don\u0027t provide any memory ordering, but since they are\npresent, we can use the optimized smp_mb__after_atomic() memory\nbarrier in the various routines to obtain the desired effect.\n\nThis patch adds the necessary memory barriers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48760",
"url": "https://www.suse.com/security/cve/CVE-2022-48760"
},
{
"category": "external",
"summary": "SUSE Bug 1226712 for CVE-2022-48760",
"url": "https://bugzilla.suse.com/1226712"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48760"
},
{
"cve": "CVE-2022-48761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48761"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: xhci-plat: fix crash when suspend if remote wake enable\n\nCrashed at i.mx8qm platform when suspend if enable remote wakeup\n\nInternal error: synchronous external abort: 96000210 [#1] PREEMPT SMP\nModules linked in:\nCPU: 2 PID: 244 Comm: kworker/u12:6 Not tainted 5.15.5-dirty #12\nHardware name: Freescale i.MX8QM MEK (DT)\nWorkqueue: events_unbound async_run_entry_fn\npstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : xhci_disable_hub_port_wake.isra.62+0x60/0xf8\nlr : xhci_disable_hub_port_wake.isra.62+0x34/0xf8\nsp : ffff80001394bbf0\nx29: ffff80001394bbf0 x28: 0000000000000000 x27: ffff00081193b578\nx26: ffff00081193b570 x25: 0000000000000000 x24: 0000000000000000\nx23: ffff00081193a29c x22: 0000000000020001 x21: 0000000000000001\nx20: 0000000000000000 x19: ffff800014e90490 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000002 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000960 x9 : ffff80001394baa0\nx8 : ffff0008145d1780 x7 : ffff0008f95b8e80 x6 : 000000001853b453\nx5 : 0000000000000496 x4 : 0000000000000000 x3 : ffff00081193a29c\nx2 : 0000000000000001 x1 : 0000000000000000 x0 : ffff000814591620\nCall trace:\n xhci_disable_hub_port_wake.isra.62+0x60/0xf8\n xhci_suspend+0x58/0x510\n xhci_plat_suspend+0x50/0x78\n platform_pm_suspend+0x2c/0x78\n dpm_run_callback.isra.25+0x50/0xe8\n __device_suspend+0x108/0x3c0\n\nThe basic flow:\n\t1. run time suspend call xhci_suspend, xhci parent devices gate the clock.\n 2. echo mem \u003e/sys/power/state, system _device_suspend call xhci_suspend\n 3. xhci_suspend call xhci_disable_hub_port_wake, which access register,\n\t but clock already gated by run time suspend.\n\nThis problem was hidden by power domain driver, which call run time resume before it.\n\nBut the below commit remove it and make this issue happen.\n\tcommit c1df456d0f06e (\"PM: domains: Don\u0027t runtime resume devices at genpd_prepare()\")\n\nThis patch call run time resume before suspend to make sure clock is on\nbefore access register.\n\nTesteb-by: Abel Vesa \u003cabel.vesa@nxp.com\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48761",
"url": "https://www.suse.com/security/cve/CVE-2022-48761"
},
{
"category": "external",
"summary": "SUSE Bug 1226701 for CVE-2022-48761",
"url": "https://bugzilla.suse.com/1226701"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48761"
},
{
"cve": "CVE-2022-48771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48771"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix stale file descriptors on failed usercopy\n\nA failing usercopy of the fence_rep object will lead to a stale entry in\nthe file descriptor table as put_unused_fd() won\u0027t release it. This\nenables userland to refer to a dangling \u0027file\u0027 object through that still\nvalid file descriptor, leading to all kinds of use-after-free\nexploitation scenarios.\n\nFix this by deferring the call to fd_install() until after the usercopy\nhas succeeded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48771",
"url": "https://www.suse.com/security/cve/CVE-2022-48771"
},
{
"category": "external",
"summary": "SUSE Bug 1226732 for CVE-2022-48771",
"url": "https://bugzilla.suse.com/1226732"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48771"
},
{
"cve": "CVE-2022-48772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-48772"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: lgdt3306a: Add a check against null-pointer-def\n\nThe driver should check whether the client provides the platform_data.\n\nThe following log reveals it:\n\n[ 29.610324] BUG: KASAN: null-ptr-deref in kmemdup+0x30/0x40\n[ 29.610730] Read of size 40 at addr 0000000000000000 by task bash/414\n[ 29.612820] Call Trace:\n[ 29.613030] \u003cTASK\u003e\n[ 29.613201] dump_stack_lvl+0x56/0x6f\n[ 29.613496] ? kmemdup+0x30/0x40\n[ 29.613754] print_report.cold+0x494/0x6b7\n[ 29.614082] ? kmemdup+0x30/0x40\n[ 29.614340] kasan_report+0x8a/0x190\n[ 29.614628] ? kmemdup+0x30/0x40\n[ 29.614888] kasan_check_range+0x14d/0x1d0\n[ 29.615213] memcpy+0x20/0x60\n[ 29.615454] kmemdup+0x30/0x40\n[ 29.615700] lgdt3306a_probe+0x52/0x310\n[ 29.616339] i2c_device_probe+0x951/0xa90",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-48772",
"url": "https://www.suse.com/security/cve/CVE-2022-48772"
},
{
"category": "external",
"summary": "SUSE Bug 1226976 for CVE-2022-48772",
"url": "https://bugzilla.suse.com/1226976"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2022-48772"
},
{
"cve": "CVE-2023-24023",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-24023"
}
],
"notes": [
{
"category": "general",
"text": "Bluetooth BR/EDR devices with Secure Simple Pairing and Secure Connections pairing in Bluetooth Core Specification 4.2 through 5.4 allow certain man-in-the-middle attacks that force a short key length, and might lead to discovery of the encryption key and live injection, aka BLUFFS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-24023",
"url": "https://www.suse.com/security/cve/CVE-2023-24023"
},
{
"category": "external",
"summary": "SUSE Bug 1218148 for CVE-2023-24023",
"url": "https://bugzilla.suse.com/1218148"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-24023"
},
{
"cve": "CVE-2023-52622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52622"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid online resizing failures due to oversized flex bg\n\nWhen we online resize an ext4 filesystem with a oversized flexbg_size,\n\n mkfs.ext4 -F -G 67108864 $dev -b 4096 100M\n mount $dev $dir\n resize2fs $dev 16G\n\nthe following WARN_ON is triggered:\n==================================================================\nWARNING: CPU: 0 PID: 427 at mm/page_alloc.c:4402 __alloc_pages+0x411/0x550\nModules linked in: sg(E)\nCPU: 0 PID: 427 Comm: resize2fs Tainted: G E 6.6.0-rc5+ #314\nRIP: 0010:__alloc_pages+0x411/0x550\nCall Trace:\n \u003cTASK\u003e\n __kmalloc_large_node+0xa2/0x200\n __kmalloc+0x16e/0x290\n ext4_resize_fs+0x481/0xd80\n __ext4_ioctl+0x1616/0x1d90\n ext4_ioctl+0x12/0x20\n __x64_sys_ioctl+0xf0/0x150\n do_syscall_64+0x3b/0x90\n==================================================================\n\nThis is because flexbg_size is too large and the size of the new_group_data\narray to be allocated exceeds MAX_ORDER. Currently, the minimum value of\nMAX_ORDER is 8, the minimum value of PAGE_SIZE is 4096, the corresponding\nmaximum number of groups that can be allocated is:\n\n (PAGE_SIZE \u003c\u003c MAX_ORDER) / sizeof(struct ext4_new_group_data) ~ 21845\n\nAnd the value that is down-aligned to the power of 2 is 16384. Therefore,\nthis value is defined as MAX_RESIZE_BG, and the number of groups added\neach time does not exceed this value during resizing, and is added multiple\ntimes to complete the online resizing. The difference is that the metadata\nin a flex_bg may be more dispersed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52622",
"url": "https://www.suse.com/security/cve/CVE-2023-52622"
},
{
"category": "external",
"summary": "SUSE Bug 1222080 for CVE-2023-52622",
"url": "https://bugzilla.suse.com/1222080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52622"
},
{
"cve": "CVE-2023-52675",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52675"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/imc-pmu: Add a null pointer check in update_events_in_group()\n\nkasprintf() returns a pointer to dynamically allocated memory\nwhich can be NULL upon failure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52675",
"url": "https://www.suse.com/security/cve/CVE-2023-52675"
},
{
"category": "external",
"summary": "SUSE Bug 1224504 for CVE-2023-52675",
"url": "https://bugzilla.suse.com/1224504"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52675"
},
{
"cve": "CVE-2023-52737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52737"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: lock the inode in shared mode before starting fiemap\n\nCurrently fiemap does not take the inode\u0027s lock (VFS lock), it only locks\na file range in the inode\u0027s io tree. This however can lead to a deadlock\nif we have a concurrent fsync on the file and fiemap code triggers a fault\nwhen accessing the user space buffer with fiemap_fill_next_extent(). The\ndeadlock happens on the inode\u0027s i_mmap_lock semaphore, which is taken both\nby fsync and btrfs_page_mkwrite(). This deadlock was recently reported by\nsyzbot and triggers a trace like the following:\n\n task:syz-executor361 state:D stack:20264 pid:5668 ppid:5119 flags:0x00004004\n Call Trace:\n \u003cTASK\u003e\n context_switch kernel/sched/core.c:5293 [inline]\n __schedule+0x995/0xe20 kernel/sched/core.c:6606\n schedule+0xcb/0x190 kernel/sched/core.c:6682\n wait_on_state fs/btrfs/extent-io-tree.c:707 [inline]\n wait_extent_bit+0x577/0x6f0 fs/btrfs/extent-io-tree.c:751\n lock_extent+0x1c2/0x280 fs/btrfs/extent-io-tree.c:1742\n find_lock_delalloc_range+0x4e6/0x9c0 fs/btrfs/extent_io.c:488\n writepage_delalloc+0x1ef/0x540 fs/btrfs/extent_io.c:1863\n __extent_writepage+0x736/0x14e0 fs/btrfs/extent_io.c:2174\n extent_write_cache_pages+0x983/0x1220 fs/btrfs/extent_io.c:3091\n extent_writepages+0x219/0x540 fs/btrfs/extent_io.c:3211\n do_writepages+0x3c3/0x680 mm/page-writeback.c:2581\n filemap_fdatawrite_wbc+0x11e/0x170 mm/filemap.c:388\n __filemap_fdatawrite_range mm/filemap.c:421 [inline]\n filemap_fdatawrite_range+0x175/0x200 mm/filemap.c:439\n btrfs_fdatawrite_range fs/btrfs/file.c:3850 [inline]\n start_ordered_ops fs/btrfs/file.c:1737 [inline]\n btrfs_sync_file+0x4ff/0x1190 fs/btrfs/file.c:1839\n generic_write_sync include/linux/fs.h:2885 [inline]\n btrfs_do_write_iter+0xcd3/0x1280 fs/btrfs/file.c:1684\n call_write_iter include/linux/fs.h:2189 [inline]\n new_sync_write fs/read_write.c:491 [inline]\n vfs_write+0x7dc/0xc50 fs/read_write.c:584\n ksys_write+0x177/0x2a0 fs/read_write.c:637\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n RIP: 0033:0x7f7d4054e9b9\n RSP: 002b:00007f7d404fa2f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n RAX: ffffffffffffffda RBX: 00007f7d405d87a0 RCX: 00007f7d4054e9b9\n RDX: 0000000000000090 RSI: 0000000020000000 RDI: 0000000000000006\n RBP: 00007f7d405a51d0 R08: 0000000000000000 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 61635f65646f6e69\n R13: 65646f7475616f6e R14: 7261637369646f6e R15: 00007f7d405d87a8\n \u003c/TASK\u003e\n INFO: task syz-executor361:5697 blocked for more than 145 seconds.\n Not tainted 6.2.0-rc3-syzkaller-00376-g7c6984405241 #0\n \"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n task:syz-executor361 state:D stack:21216 pid:5697 ppid:5119 flags:0x00004004\n Call Trace:\n \u003cTASK\u003e\n context_switch kernel/sched/core.c:5293 [inline]\n __schedule+0x995/0xe20 kernel/sched/core.c:6606\n schedule+0xcb/0x190 kernel/sched/core.c:6682\n rwsem_down_read_slowpath+0x5f9/0x930 kernel/locking/rwsem.c:1095\n __down_read_common+0x54/0x2a0 kernel/locking/rwsem.c:1260\n btrfs_page_mkwrite+0x417/0xc80 fs/btrfs/inode.c:8526\n do_page_mkwrite+0x19e/0x5e0 mm/memory.c:2947\n wp_page_shared+0x15e/0x380 mm/memory.c:3295\n handle_pte_fault mm/memory.c:4949 [inline]\n __handle_mm_fault mm/memory.c:5073 [inline]\n handle_mm_fault+0x1b79/0x26b0 mm/memory.c:5219\n do_user_addr_fault+0x69b/0xcb0 arch/x86/mm/fault.c:1428\n handle_page_fault arch/x86/mm/fault.c:1519 [inline]\n exc_page_fault+0x7a/0x110 arch/x86/mm/fault.c:1575\n asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570\n RIP: 0010:copy_user_short_string+0xd/0x40 arch/x86/lib/copy_user_64.S:233\n Code: 74 0a 89 (...)\n RSP: 0018:ffffc9000570f330 EFLAGS: 000502\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52737",
"url": "https://www.suse.com/security/cve/CVE-2023-52737"
},
{
"category": "external",
"summary": "SUSE Bug 1225484 for CVE-2023-52737",
"url": "https://bugzilla.suse.com/1225484"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52737"
},
{
"cve": "CVE-2023-52752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52752"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free bug in cifs_debug_data_proc_show()\n\nSkip SMB sessions that are being teared down\n(e.g. @ses-\u003eses_status == SES_EXITING) in cifs_debug_data_proc_show()\nto avoid use-after-free in @ses.\n\nThis fixes the following GPF when reading from /proc/fs/cifs/DebugData\nwhile mounting and umounting\n\n [ 816.251274] general protection fault, probably for non-canonical\n address 0x6b6b6b6b6b6b6d81: 0000 [#1] PREEMPT SMP NOPTI\n ...\n [ 816.260138] Call Trace:\n [ 816.260329] \u003cTASK\u003e\n [ 816.260499] ? die_addr+0x36/0x90\n [ 816.260762] ? exc_general_protection+0x1b3/0x410\n [ 816.261126] ? asm_exc_general_protection+0x26/0x30\n [ 816.261502] ? cifs_debug_tcon+0xbd/0x240 [cifs]\n [ 816.261878] ? cifs_debug_tcon+0xab/0x240 [cifs]\n [ 816.262249] cifs_debug_data_proc_show+0x516/0xdb0 [cifs]\n [ 816.262689] ? seq_read_iter+0x379/0x470\n [ 816.262995] seq_read_iter+0x118/0x470\n [ 816.263291] proc_reg_read_iter+0x53/0x90\n [ 816.263596] ? srso_alias_return_thunk+0x5/0x7f\n [ 816.263945] vfs_read+0x201/0x350\n [ 816.264211] ksys_read+0x75/0x100\n [ 816.264472] do_syscall_64+0x3f/0x90\n [ 816.264750] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n [ 816.265135] RIP: 0033:0x7fd5e669d381",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52752",
"url": "https://www.suse.com/security/cve/CVE-2023-52752"
},
{
"category": "external",
"summary": "SUSE Bug 1225487 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225487"
},
{
"category": "external",
"summary": "SUSE Bug 1225819 for CVE-2023-52752",
"url": "https://bugzilla.suse.com/1225819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2023-52752"
},
{
"cve": "CVE-2023-52754",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52754"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: imon: fix access to invalid resource for the second interface\n\nimon driver probes two USB interfaces, and at the probe of the second\ninterface, the driver assumes blindly that the first interface got\nbound with the same imon driver. It\u0027s usually true, but it\u0027s still\npossible that the first interface is bound with another driver via a\nmalformed descriptor. Then it may lead to a memory corruption, as\nspotted by syzkaller; imon driver accesses the data from drvdata as\nstruct imon_context object although it\u0027s a completely different one\nthat was assigned by another driver.\n\nThis patch adds a sanity check -- whether the first interface is\nreally bound with the imon driver or not -- for avoiding the problem\nabove at the probe time.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52754",
"url": "https://www.suse.com/security/cve/CVE-2023-52754"
},
{
"category": "external",
"summary": "SUSE Bug 1225490 for CVE-2023-52754",
"url": "https://bugzilla.suse.com/1225490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52754"
},
{
"cve": "CVE-2023-52757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52757"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential deadlock when releasing mids\n\nAll release_mid() callers seem to hold a reference of @mid so there is\nno need to call kref_put(\u0026mid-\u003erefcount, __release_mid) under\n@server-\u003emid_lock spinlock. If they don\u0027t, then an use-after-free bug\nwould have occurred anyways.\n\nBy getting rid of such spinlock also fixes a potential deadlock as\nshown below\n\nCPU 0 CPU 1\n------------------------------------------------------------------\ncifs_demultiplex_thread() cifs_debug_data_proc_show()\n release_mid()\n spin_lock(\u0026server-\u003emid_lock);\n spin_lock(\u0026cifs_tcp_ses_lock)\n\t\t\t\t spin_lock(\u0026server-\u003emid_lock)\n __release_mid()\n smb2_find_smb_tcon()\n spin_lock(\u0026cifs_tcp_ses_lock) *deadlock*",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52757",
"url": "https://www.suse.com/security/cve/CVE-2023-52757"
},
{
"category": "external",
"summary": "SUSE Bug 1225548 for CVE-2023-52757",
"url": "https://bugzilla.suse.com/1225548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52757"
},
{
"cve": "CVE-2023-52762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52762"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-blk: fix implicit overflow on virtio_max_dma_size\n\nThe following codes have an implicit conversion from size_t to u32:\n(u32)max_size = (size_t)virtio_max_dma_size(vdev);\n\nThis may lead overflow, Ex (size_t)4G -\u003e (u32)0. Once\nvirtio_max_dma_size() has a larger size than U32_MAX, use U32_MAX\ninstead.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52762",
"url": "https://www.suse.com/security/cve/CVE-2023-52762"
},
{
"category": "external",
"summary": "SUSE Bug 1225573 for CVE-2023-52762",
"url": "https://bugzilla.suse.com/1225573"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52762"
},
{
"cve": "CVE-2023-52764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52764"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: gspca: cpia1: shift-out-of-bounds in set_flicker\n\nSyzkaller reported the following issue:\nUBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27\nshift exponent 245 is too large for 32-bit type \u0027int\u0027\n\nWhen the value of the variable \"sd-\u003eparams.exposure.gain\" exceeds the\nnumber of bits in an integer, a shift-out-of-bounds error is reported. It\nis triggered because the variable \"currentexp\" cannot be left-shifted by\nmore than the number of bits in an integer. In order to avoid invalid\nrange during left-shift, the conditional expression is added.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52764",
"url": "https://www.suse.com/security/cve/CVE-2023-52764"
},
{
"category": "external",
"summary": "SUSE Bug 1225571 for CVE-2023-52764",
"url": "https://bugzilla.suse.com/1225571"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52764"
},
{
"cve": "CVE-2023-52784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52784"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: stop the device in bond_setup_by_slave()\n\nCommit 9eed321cde22 (\"net: lapbether: only support ethernet devices\")\nhas been able to keep syzbot away from net/lapb, until today.\n\nIn the following splat [1], the issue is that a lapbether device has\nbeen created on a bonding device without members. Then adding a non\nARPHRD_ETHER member forced the bonding master to change its type.\n\nThe fix is to make sure we call dev_close() in bond_setup_by_slave()\nso that the potential linked lapbether devices (or any other devices\nhaving assumptions on the physical device) are removed.\n\nA similar bug has been addressed in commit 40baec225765\n(\"bonding: fix panic on non-ARPHRD_ETHER enslave failure\")\n\n[1]\nskbuff: skb_under_panic: text:ffff800089508810 len:44 put:40 head:ffff0000c78e7c00 data:ffff0000c78e7bea tail:0x16 end:0x140 dev:bond0\nkernel BUG at net/core/skbuff.c:192 !\nInternal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\nModules linked in:\nCPU: 0 PID: 6007 Comm: syz-executor383 Not tainted 6.6.0-rc3-syzkaller-gbf6547d8715b #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023\npstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : skb_panic net/core/skbuff.c:188 [inline]\npc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nlr : skb_panic net/core/skbuff.c:188 [inline]\nlr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nsp : ffff800096a06aa0\nx29: ffff800096a06ab0 x28: ffff800096a06ba0 x27: dfff800000000000\nx26: ffff0000ce9b9b50 x25: 0000000000000016 x24: ffff0000c78e7bea\nx23: ffff0000c78e7c00 x22: 000000000000002c x21: 0000000000000140\nx20: 0000000000000028 x19: ffff800089508810 x18: ffff800096a06100\nx17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001\nx14: 1fffe00036837a32 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000201 x10: 0000000000000000 x9 : cb50b496c519aa00\nx8 : cb50b496c519aa00 x7 : 0000000000000001 x6 : 0000000000000001\nx5 : ffff800096a063b8 x4 : ffff80008e280f80 x3 : ffff8000805ad11c\nx2 : 0000000000000001 x1 : 0000000100000201 x0 : 0000000000000086\nCall trace:\nskb_panic net/core/skbuff.c:188 [inline]\nskb_under_panic+0x13c/0x140 net/core/skbuff.c:202\nskb_push+0xf0/0x108 net/core/skbuff.c:2446\nip6gre_header+0xbc/0x738 net/ipv6/ip6_gre.c:1384\ndev_hard_header include/linux/netdevice.h:3136 [inline]\nlapbeth_data_transmit+0x1c4/0x298 drivers/net/wan/lapbether.c:257\nlapb_data_transmit+0x8c/0xb0 net/lapb/lapb_iface.c:447\nlapb_transmit_buffer+0x178/0x204 net/lapb/lapb_out.c:149\nlapb_send_control+0x220/0x320 net/lapb/lapb_subr.c:251\n__lapb_disconnect_request+0x9c/0x17c net/lapb/lapb_iface.c:326\nlapb_device_event+0x288/0x4e0 net/lapb/lapb_iface.c:492\nnotifier_call_chain+0x1a4/0x510 kernel/notifier.c:93\nraw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461\ncall_netdevice_notifiers_info net/core/dev.c:1970 [inline]\ncall_netdevice_notifiers_extack net/core/dev.c:2008 [inline]\ncall_netdevice_notifiers net/core/dev.c:2022 [inline]\n__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508\ndev_close_many+0x1e0/0x470 net/core/dev.c:1559\ndev_close+0x174/0x250 net/core/dev.c:1585\nlapbeth_device_event+0x2e4/0x958 drivers/net/wan/lapbether.c:466\nnotifier_call_chain+0x1a4/0x510 kernel/notifier.c:93\nraw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461\ncall_netdevice_notifiers_info net/core/dev.c:1970 [inline]\ncall_netdevice_notifiers_extack net/core/dev.c:2008 [inline]\ncall_netdevice_notifiers net/core/dev.c:2022 [inline]\n__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508\ndev_close_many+0x1e0/0x470 net/core/dev.c:1559\ndev_close+0x174/0x250 net/core/dev.c:1585\nbond_enslave+0x2298/0x30cc drivers/net/bonding/bond_main.c:2332\nbond_do_ioctl+0x268/0xc64 drivers/net/bonding/bond_main.c:4539\ndev_ifsioc+0x754/0x9ac\ndev_ioctl+0x4d8/0xd34 net/core/dev_ioctl.c:786\nsock_do_ioctl+0x1d4/0x2d0 net/socket.c:1217\nsock_ioctl+0x4e8/0x834 net/socket.c:1322\nvfs_ioctl fs/ioctl.c:51 [inline]\n__do_\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52784",
"url": "https://www.suse.com/security/cve/CVE-2023-52784"
},
{
"category": "external",
"summary": "SUSE Bug 1224946 for CVE-2023-52784",
"url": "https://bugzilla.suse.com/1224946"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52784"
},
{
"cve": "CVE-2023-52808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52808"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: hisi_sas: Set debugfs_dir pointer to NULL after removing debugfs\n\nIf init debugfs failed during device registration due to memory allocation\nfailure, debugfs_remove_recursive() is called, after which debugfs_dir is\nnot set to NULL. debugfs_remove_recursive() will be called again during\ndevice removal. As a result, illegal pointer is accessed.\n\n[ 1665.467244] hisi_sas_v3_hw 0000:b4:02.0: failed to init debugfs!\n...\n[ 1669.836708] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0\n[ 1669.872669] pc : down_write+0x24/0x70\n[ 1669.876315] lr : down_write+0x1c/0x70\n[ 1669.879961] sp : ffff000036f53a30\n[ 1669.883260] x29: ffff000036f53a30 x28: ffffa027c31549f8\n[ 1669.888547] x27: ffffa027c3140000 x26: 0000000000000000\n[ 1669.893834] x25: ffffa027bf37c270 x24: ffffa027bf37c270\n[ 1669.899122] x23: ffff0000095406b8 x22: ffff0000095406a8\n[ 1669.904408] x21: 0000000000000000 x20: ffffa027bf37c310\n[ 1669.909695] x19: 00000000000000a0 x18: ffff8027dcd86f10\n[ 1669.914982] x17: 0000000000000000 x16: 0000000000000000\n[ 1669.920268] x15: 0000000000000000 x14: ffffa0274014f870\n[ 1669.925555] x13: 0000000000000040 x12: 0000000000000228\n[ 1669.930842] x11: 0000000000000020 x10: 0000000000000bb0\n[ 1669.936129] x9 : ffff000036f537f0 x8 : ffff80273088ca10\n[ 1669.941416] x7 : 000000000000001d x6 : 00000000ffffffff\n[ 1669.946702] x5 : ffff000008a36310 x4 : ffff80273088be00\n[ 1669.951989] x3 : ffff000009513e90 x2 : 0000000000000000\n[ 1669.957276] x1 : 00000000000000a0 x0 : ffffffff00000001\n[ 1669.962563] Call trace:\n[ 1669.965000] down_write+0x24/0x70\n[ 1669.968301] debugfs_remove_recursive+0x5c/0x1b0\n[ 1669.972905] hisi_sas_debugfs_exit+0x24/0x30 [hisi_sas_main]\n[ 1669.978541] hisi_sas_v3_remove+0x130/0x150 [hisi_sas_v3_hw]\n[ 1669.984175] pci_device_remove+0x48/0xd8\n[ 1669.988082] device_release_driver_internal+0x1b4/0x250\n[ 1669.993282] device_release_driver+0x28/0x38\n[ 1669.997534] pci_stop_bus_device+0x84/0xb8\n[ 1670.001611] pci_stop_and_remove_bus_device_locked+0x24/0x40\n[ 1670.007244] remove_store+0xfc/0x140\n[ 1670.010802] dev_attr_store+0x44/0x60\n[ 1670.014448] sysfs_kf_write+0x58/0x80\n[ 1670.018095] kernfs_fop_write+0xe8/0x1f0\n[ 1670.022000] __vfs_write+0x60/0x190\n[ 1670.025472] vfs_write+0xac/0x1c0\n[ 1670.028771] ksys_write+0x6c/0xd8\n[ 1670.032071] __arm64_sys_write+0x24/0x30\n[ 1670.035977] el0_svc_common+0x78/0x130\n[ 1670.039710] el0_svc_handler+0x38/0x78\n[ 1670.043442] el0_svc+0x8/0xc\n\nTo fix this, set debugfs_dir to NULL after debugfs_remove_recursive().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52808",
"url": "https://www.suse.com/security/cve/CVE-2023-52808"
},
{
"category": "external",
"summary": "SUSE Bug 1225555 for CVE-2023-52808",
"url": "https://bugzilla.suse.com/1225555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52808"
},
{
"cve": "CVE-2023-52809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52809"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup()\n\nfc_lport_ptp_setup() did not check the return value of fc_rport_create()\nwhich can return NULL and would cause a NULL pointer dereference. Address\nthis issue by checking return value of fc_rport_create() and log error\nmessage on fc_rport_create() failed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52809",
"url": "https://www.suse.com/security/cve/CVE-2023-52809"
},
{
"category": "external",
"summary": "SUSE Bug 1225556 for CVE-2023-52809",
"url": "https://bugzilla.suse.com/1225556"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52809"
},
{
"cve": "CVE-2023-52811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52811"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: ibmvfc: Remove BUG_ON in the case of an empty event pool\n\nIn practice the driver should never send more commands than are allocated\nto a queue\u0027s event pool. In the unlikely event that this happens, the code\nasserts a BUG_ON, and in the case that the kernel is not configured to\ncrash on panic returns a junk event pointer from the empty event list\ncausing things to spiral from there. This BUG_ON is a historical artifact\nof the ibmvfc driver first being upstreamed, and it is well known now that\nthe use of BUG_ON is bad practice except in the most unrecoverable\nscenario. There is nothing about this scenario that prevents the driver\nfrom recovering and carrying on.\n\nRemove the BUG_ON in question from ibmvfc_get_event() and return a NULL\npointer in the case of an empty event pool. Update all call sites to\nibmvfc_get_event() to check for a NULL pointer and perfrom the appropriate\nfailure or recovery action.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52811",
"url": "https://www.suse.com/security/cve/CVE-2023-52811"
},
{
"category": "external",
"summary": "SUSE Bug 1225559 for CVE-2023-52811",
"url": "https://bugzilla.suse.com/1225559"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52811"
},
{
"cve": "CVE-2023-52832",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52832"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don\u0027t return unset power in ieee80211_get_tx_power()\n\nWe can get a UBSAN warning if ieee80211_get_tx_power() returns the\nINT_MIN value mac80211 internally uses for \"unset power level\".\n\n UBSAN: signed-integer-overflow in net/wireless/nl80211.c:3816:5\n -2147483648 * 100 cannot be represented in type \u0027int\u0027\n CPU: 0 PID: 20433 Comm: insmod Tainted: G WC OE\n Call Trace:\n dump_stack+0x74/0x92\n ubsan_epilogue+0x9/0x50\n handle_overflow+0x8d/0xd0\n __ubsan_handle_mul_overflow+0xe/0x10\n nl80211_send_iface+0x688/0x6b0 [cfg80211]\n [...]\n cfg80211_register_wdev+0x78/0xb0 [cfg80211]\n cfg80211_netdev_notifier_call+0x200/0x620 [cfg80211]\n [...]\n ieee80211_if_add+0x60e/0x8f0 [mac80211]\n ieee80211_register_hw+0xda5/0x1170 [mac80211]\n\nIn this case, simply return an error instead, to indicate\nthat no data is available.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52832",
"url": "https://www.suse.com/security/cve/CVE-2023-52832"
},
{
"category": "external",
"summary": "SUSE Bug 1225577 for CVE-2023-52832",
"url": "https://bugzilla.suse.com/1225577"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52832"
},
{
"cve": "CVE-2023-52834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52834"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\natl1c: Work around the DMA RX overflow issue\n\nThis is based on alx driver commit 881d0327db37 (\"net: alx: Work around\nthe DMA RX overflow issue\").\n\nThe alx and atl1c drivers had RX overflow error which was why a custom\nallocator was created to avoid certain addresses. The simpler workaround\nthen created for alx driver, but not for atl1c due to lack of tester.\n\nInstead of using a custom allocator, check the allocated skb address and\nuse skb_reserve() to move away from problematic 0x...fc0 address.\n\nTested on AR8131 on Acer 4540.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52834",
"url": "https://www.suse.com/security/cve/CVE-2023-52834"
},
{
"category": "external",
"summary": "SUSE Bug 1225599 for CVE-2023-52834",
"url": "https://bugzilla.suse.com/1225599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52834"
},
{
"cve": "CVE-2023-52835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52835"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Bail out early if the request AUX area is out of bound\n\nWhen perf-record with a large AUX area, e.g 4GB, it fails with:\n\n #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n failed to mmap with 12 (Cannot allocate memory)\n\nand it reveals a WARNING with __alloc_pages():\n\n\t------------[ cut here ]------------\n\tWARNING: CPU: 44 PID: 17573 at mm/page_alloc.c:5568 __alloc_pages+0x1ec/0x248\n\tCall trace:\n\t __alloc_pages+0x1ec/0x248\n\t __kmalloc_large_node+0xc0/0x1f8\n\t __kmalloc_node+0x134/0x1e8\n\t rb_alloc_aux+0xe0/0x298\n\t perf_mmap+0x440/0x660\n\t mmap_region+0x308/0x8a8\n\t do_mmap+0x3c0/0x528\n\t vm_mmap_pgoff+0xf4/0x1b8\n\t ksys_mmap_pgoff+0x18c/0x218\n\t __arm64_sys_mmap+0x38/0x58\n\t invoke_syscall+0x50/0x128\n\t el0_svc_common.constprop.0+0x58/0x188\n\t do_el0_svc+0x34/0x50\n\t el0_svc+0x34/0x108\n\t el0t_64_sync_handler+0xb8/0xc0\n\t el0t_64_sync+0x1a4/0x1a8\n\n\u0027rb-\u003eaux_pages\u0027 allocated by kcalloc() is a pointer array which is used to\nmaintains AUX trace pages. The allocated page for this array is physically\ncontiguous (and virtually contiguous) with an order of 0..MAX_ORDER. If the\nsize of pointer array crosses the limitation set by MAX_ORDER, it reveals a\nWARNING.\n\nSo bail out early with -ENOMEM if the request AUX area is out of bound,\ne.g.:\n\n #perf record -C 0 -m ,4G -e arm_spe_0// -- sleep 1\n failed to mmap with 12 (Cannot allocate memory)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52835",
"url": "https://www.suse.com/security/cve/CVE-2023-52835"
},
{
"category": "external",
"summary": "SUSE Bug 1225602 for CVE-2023-52835",
"url": "https://bugzilla.suse.com/1225602"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "low"
}
],
"title": "CVE-2023-52835"
},
{
"cve": "CVE-2023-52843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52843"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nllc: verify mac len before reading mac header\n\nLLC reads the mac header with eth_hdr without verifying that the skb\nhas an Ethernet header.\n\nSyzbot was able to enter llc_rcv on a tun device. Tun can insert\npackets without mac len and with user configurable skb-\u003eprotocol\n(passing a tun_pi header when not configuring IFF_NO_PI).\n\n BUG: KMSAN: uninit-value in llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]\n BUG: KMSAN: uninit-value in llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111\n llc_station_ac_send_test_r net/llc/llc_station.c:81 [inline]\n llc_station_rcv+0x6fb/0x1290 net/llc/llc_station.c:111\n llc_rcv+0xc5d/0x14a0 net/llc/llc_input.c:218\n __netif_receive_skb_one_core net/core/dev.c:5523 [inline]\n __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5637\n netif_receive_skb_internal net/core/dev.c:5723 [inline]\n netif_receive_skb+0x58/0x660 net/core/dev.c:5782\n tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555\n tun_get_user+0x54c5/0x69c0 drivers/net/tun.c:2002\n\nAdd a mac_len test before all three eth_hdr(skb) calls under net/llc.\n\nThere are further uses in include/net/llc_pdu.h. All these are\nprotected by a test skb-\u003eprotocol == ETH_P_802_2. Which does not\nprotect against this tun scenario.\n\nBut the mac_len test added in this patch in llc_fixup_skb will\nindirectly protect those too. That is called from llc_rcv before any\nother LLC code.\n\nIt is tempting to just add a blanket mac_len check in llc_rcv, but\nnot sure whether that could break valid LLC paths that do not assume\nan Ethernet header. 802.2 LLC may be used on top of non-802.3\nprotocols in principle. The below referenced commit shows that used\nto, on top of Token Ring.\n\nAt least one of the three eth_hdr uses goes back to before the start\nof git history. But the one that syzbot exercises is introduced in\nthis commit. That commit is old enough (2008), that effectively all\nstable kernels should receive this.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52843",
"url": "https://www.suse.com/security/cve/CVE-2023-52843"
},
{
"category": "external",
"summary": "SUSE Bug 1224951 for CVE-2023-52843",
"url": "https://bugzilla.suse.com/1224951"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52843"
},
{
"cve": "CVE-2023-52845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52845"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Change nla_policy for bearer-related names to NLA_NUL_STRING\n\nsyzbot reported the following uninit-value access issue [1]:\n\n=====================================================\nBUG: KMSAN: uninit-value in strlen lib/string.c:418 [inline]\nBUG: KMSAN: uninit-value in strstr+0xb8/0x2f0 lib/string.c:756\n strlen lib/string.c:418 [inline]\n strstr+0xb8/0x2f0 lib/string.c:756\n tipc_nl_node_reset_link_stats+0x3ea/0xb50 net/tipc/node.c:2595\n genl_family_rcv_msg_doit net/netlink/genetlink.c:971 [inline]\n genl_family_rcv_msg net/netlink/genetlink.c:1051 [inline]\n genl_rcv_msg+0x11ec/0x1290 net/netlink/genetlink.c:1066\n netlink_rcv_skb+0x371/0x650 net/netlink/af_netlink.c:2545\n genl_rcv+0x40/0x60 net/netlink/genetlink.c:1075\n netlink_unicast_kernel net/netlink/af_netlink.c:1342 [inline]\n netlink_unicast+0xf47/0x1250 net/netlink/af_netlink.c:1368\n netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910\n sock_sendmsg_nosec net/socket.c:730 [inline]\n sock_sendmsg net/socket.c:753 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595\n __sys_sendmsg net/socket.c:2624 [inline]\n __do_sys_sendmsg net/socket.c:2633 [inline]\n __se_sys_sendmsg net/socket.c:2631 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nUninit was created at:\n slab_post_alloc_hook+0x12f/0xb70 mm/slab.h:767\n slab_alloc_node mm/slub.c:3478 [inline]\n kmem_cache_alloc_node+0x577/0xa80 mm/slub.c:3523\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:559\n __alloc_skb+0x318/0x740 net/core/skbuff.c:650\n alloc_skb include/linux/skbuff.h:1286 [inline]\n netlink_alloc_large_skb net/netlink/af_netlink.c:1214 [inline]\n netlink_sendmsg+0xb34/0x13d0 net/netlink/af_netlink.c:1885\n sock_sendmsg_nosec net/socket.c:730 [inline]\n sock_sendmsg net/socket.c:753 [inline]\n ____sys_sendmsg+0x9c2/0xd60 net/socket.c:2541\n ___sys_sendmsg+0x28d/0x3c0 net/socket.c:2595\n __sys_sendmsg net/socket.c:2624 [inline]\n __do_sys_sendmsg net/socket.c:2633 [inline]\n __se_sys_sendmsg net/socket.c:2631 [inline]\n __x64_sys_sendmsg+0x307/0x490 net/socket.c:2631\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x63/0xcd\n\nTIPC bearer-related names including link names must be null-terminated\nstrings. If a link name which is not null-terminated is passed through\nnetlink, strstr() and similar functions can cause buffer overrun. This\ncauses the above issue.\n\nThis patch changes the nla_policy for bearer-related names from NLA_STRING\nto NLA_NUL_STRING. This resolves the issue by ensuring that only\nnull-terminated strings are accepted as bearer-related names.\n\nsyzbot reported similar uninit-value issue related to bearer names [2]. The\nroot cause of this issue is that a non-null-terminated bearer name was\npassed. This patch also resolved this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52845",
"url": "https://www.suse.com/security/cve/CVE-2023-52845"
},
{
"category": "external",
"summary": "SUSE Bug 1225585 for CVE-2023-52845",
"url": "https://bugzilla.suse.com/1225585"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52845"
},
{
"cve": "CVE-2023-52855",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52855"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: fix possible NULL pointer dereference caused by driver concurrency\n\nIn _dwc2_hcd_urb_enqueue(), \"urb-\u003ehcpriv = NULL\" is executed without\nholding the lock \"hsotg-\u003elock\". In _dwc2_hcd_urb_dequeue():\n\n spin_lock_irqsave(\u0026hsotg-\u003elock, flags);\n ...\n\tif (!urb-\u003ehcpriv) {\n\t\tdev_dbg(hsotg-\u003edev, \"## urb-\u003ehcpriv is NULL ##\\n\");\n\t\tgoto out;\n\t}\n rc = dwc2_hcd_urb_dequeue(hsotg, urb-\u003ehcpriv); // Use urb-\u003ehcpriv\n ...\nout:\n spin_unlock_irqrestore(\u0026hsotg-\u003elock, flags);\n\nWhen _dwc2_hcd_urb_enqueue() and _dwc2_hcd_urb_dequeue() are\nconcurrently executed, the NULL check of \"urb-\u003ehcpriv\" can be executed\nbefore \"urb-\u003ehcpriv = NULL\". After urb-\u003ehcpriv is NULL, it can be used\nin the function call to dwc2_hcd_urb_dequeue(), which can cause a NULL\npointer dereference.\n\nThis possible bug is found by an experimental static analysis tool\ndeveloped by myself. This tool analyzes the locking APIs to extract\nfunction pairs that can be concurrently executed, and then analyzes the\ninstructions in the paired functions to identify possible concurrency\nbugs including data races and atomicity violations. The above possible\nbug is reported, when my tool analyzes the source code of Linux 6.5.\n\nTo fix this possible bug, \"urb-\u003ehcpriv = NULL\" should be executed with\nholding the lock \"hsotg-\u003elock\". After using this patch, my tool never\nreports the possible bug, with the kernelconfiguration allyesconfig for\nx86_64. Because I have no associated hardware, I cannot test the patch\nin runtime testing, and just verify it according to the code logic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52855",
"url": "https://www.suse.com/security/cve/CVE-2023-52855"
},
{
"category": "external",
"summary": "SUSE Bug 1225583 for CVE-2023-52855",
"url": "https://bugzilla.suse.com/1225583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52855"
},
{
"cve": "CVE-2023-52881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-52881"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: do not accept ACK of bytes we never sent\n\nThis patch is based on a detailed report and ideas from Yepeng Pan\nand Christian Rossow.\n\nACK seq validation is currently following RFC 5961 5.2 guidelines:\n\n The ACK value is considered acceptable only if\n it is in the range of ((SND.UNA - MAX.SND.WND) \u003c= SEG.ACK \u003c=\n SND.NXT). All incoming segments whose ACK value doesn\u0027t satisfy the\n above condition MUST be discarded and an ACK sent back. It needs to\n be noted that RFC 793 on page 72 (fifth check) says: \"If the ACK is a\n duplicate (SEG.ACK \u003c SND.UNA), it can be ignored. If the ACK\n acknowledges something not yet sent (SEG.ACK \u003e SND.NXT) then send an\n ACK, drop the segment, and return\". The \"ignored\" above implies that\n the processing of the incoming data segment continues, which means\n the ACK value is treated as acceptable. This mitigation makes the\n ACK check more stringent since any ACK \u003c SND.UNA wouldn\u0027t be\n accepted, instead only ACKs that are in the range ((SND.UNA -\n MAX.SND.WND) \u003c= SEG.ACK \u003c= SND.NXT) get through.\n\nThis can be refined for new (and possibly spoofed) flows,\nby not accepting ACK for bytes that were never sent.\n\nThis greatly improves TCP security at a little cost.\n\nI added a Fixes: tag to make sure this patch will reach stable trees,\neven if the \u0027blamed\u0027 patch was adhering to the RFC.\n\ntp-\u003ebytes_acked was added in linux-4.2\n\nFollowing packetdrill test (courtesy of Yepeng Pan) shows\nthe issue at hand:\n\n0 socket(..., SOCK_STREAM, IPPROTO_TCP) = 3\n+0 setsockopt(3, SOL_SOCKET, SO_REUSEADDR, [1], 4) = 0\n+0 bind(3, ..., ...) = 0\n+0 listen(3, 1024) = 0\n\n// ---------------- Handshake ------------------- //\n\n// when window scale is set to 14 the window size can be extended to\n// 65535 * (2^14) = 1073725440. Linux would accept an ACK packet\n// with ack number in (Server_ISN+1-1073725440. Server_ISN+1)\n// ,though this ack number acknowledges some data never\n// sent by the server.\n\n+0 \u003c S 0:0(0) win 65535 \u003cmss 1400,nop,wscale 14\u003e\n+0 \u003e S. 0:0(0) ack 1 \u003c...\u003e\n+0 \u003c . 1:1(0) ack 1 win 65535\n+0 accept(3, ..., ...) = 4\n\n// For the established connection, we send an ACK packet,\n// the ack packet uses ack number 1 - 1073725300 + 2^32,\n// where 2^32 is used to wrap around.\n// Note: we used 1073725300 instead of 1073725440 to avoid possible\n// edge cases.\n// 1 - 1073725300 + 2^32 = 3221241997\n\n// Oops, old kernels happily accept this packet.\n+0 \u003c . 1:1001(1000) ack 3221241997 win 65535\n\n// After the kernel fix the following will be replaced by a challenge ACK,\n// and prior malicious frame would be dropped.\n+0 \u003e . 1:1(0) ack 1001",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-52881",
"url": "https://www.suse.com/security/cve/CVE-2023-52881"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1225611 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1225611"
},
{
"category": "external",
"summary": "SUSE Bug 1226152 for CVE-2023-52881",
"url": "https://bugzilla.suse.com/1226152"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-52881"
},
{
"cve": "CVE-2024-26633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26633"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: fix NEXTHDR_FRAGMENT handling in ip6_tnl_parse_tlv_enc_lim()\n\nsyzbot pointed out [1] that NEXTHDR_FRAGMENT handling is broken.\n\nReading frag_off can only be done if we pulled enough bytes\nto skb-\u003ehead. Currently we might access garbage.\n\n[1]\nBUG: KMSAN: uninit-value in ip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0\nip6_tnl_parse_tlv_enc_lim+0x94f/0xbb0\nipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]\nip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432\n__netdev_start_xmit include/linux/netdevice.h:4940 [inline]\nnetdev_start_xmit include/linux/netdevice.h:4954 [inline]\nxmit_one net/core/dev.c:3548 [inline]\ndev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564\n__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\nneigh_connected_output+0x569/0x660 net/core/neighbour.c:1592\nneigh_output include/net/neighbour.h:542 [inline]\nip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137\nip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222\nNF_HOOK_COND include/linux/netfilter.h:303 [inline]\nip6_output+0x323/0x610 net/ipv6/ip6_output.c:243\ndst_output include/net/dst.h:451 [inline]\nip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155\nip6_send_skb net/ipv6/ip6_output.c:1952 [inline]\nip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972\nrawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582\nrawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920\ninet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg net/socket.c:745 [inline]\n____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n__sys_sendmsg net/socket.c:2667 [inline]\n__do_sys_sendmsg net/socket.c:2676 [inline]\n__se_sys_sendmsg net/socket.c:2674 [inline]\n__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674\ndo_syscall_x64 arch/x86/entry/common.c:52 [inline]\ndo_syscall_64+0x44/0x110 arch/x86/entry/common.c:83\nentry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\nslab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\nslab_alloc_node mm/slub.c:3478 [inline]\n__kmem_cache_alloc_node+0x5c9/0x970 mm/slub.c:3517\n__do_kmalloc_node mm/slab_common.c:1006 [inline]\n__kmalloc_node_track_caller+0x118/0x3c0 mm/slab_common.c:1027\nkmalloc_reserve+0x249/0x4a0 net/core/skbuff.c:582\npskb_expand_head+0x226/0x1a00 net/core/skbuff.c:2098\n__pskb_pull_tail+0x13b/0x2310 net/core/skbuff.c:2655\npskb_may_pull_reason include/linux/skbuff.h:2673 [inline]\npskb_may_pull include/linux/skbuff.h:2681 [inline]\nip6_tnl_parse_tlv_enc_lim+0x901/0xbb0 net/ipv6/ip6_tunnel.c:408\nipxip6_tnl_xmit net/ipv6/ip6_tunnel.c:1326 [inline]\nip6_tnl_start_xmit+0xab2/0x1a70 net/ipv6/ip6_tunnel.c:1432\n__netdev_start_xmit include/linux/netdevice.h:4940 [inline]\nnetdev_start_xmit include/linux/netdevice.h:4954 [inline]\nxmit_one net/core/dev.c:3548 [inline]\ndev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564\n__dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349\ndev_queue_xmit include/linux/netdevice.h:3134 [inline]\nneigh_connected_output+0x569/0x660 net/core/neighbour.c:1592\nneigh_output include/net/neighbour.h:542 [inline]\nip6_finish_output2+0x23a9/0x2b30 net/ipv6/ip6_output.c:137\nip6_finish_output+0x855/0x12b0 net/ipv6/ip6_output.c:222\nNF_HOOK_COND include/linux/netfilter.h:303 [inline]\nip6_output+0x323/0x610 net/ipv6/ip6_output.c:243\ndst_output include/net/dst.h:451 [inline]\nip6_local_out+0xe9/0x140 net/ipv6/output_core.c:155\nip6_send_skb net/ipv6/ip6_output.c:1952 [inline]\nip6_push_pending_frames+0x1f9/0x560 net/ipv6/ip6_output.c:1972\nrawv6_push_pending_frames+0xbe8/0xdf0 net/ipv6/raw.c:582\nrawv6_sendmsg+0x2b66/0x2e70 net/ipv6/raw.c:920\ninet_sendmsg+0x105/0x190 net/ipv4/af_inet.c:847\nsock_sendmsg_nosec net/socket.c:730 [inline]\n__sock_sendmsg net/socket.c:745 [inline]\n____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584\n___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638\n__sys_sendmsg net/socket.c:2667 [inline]\n__do_sys_sendms\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26633",
"url": "https://www.suse.com/security/cve/CVE-2024-26633"
},
{
"category": "external",
"summary": "SUSE Bug 1221647 for CVE-2024-26633",
"url": "https://bugzilla.suse.com/1221647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26633"
},
{
"cve": "CVE-2024-26641",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26641"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip6_tunnel: make sure to pull inner header in __ip6_tnl_rcv()\n\nsyzbot found __ip6_tnl_rcv() could access unitiliazed data [1].\n\nCall pskb_inet_may_pull() to fix this, and initialize ipv6h\nvariable after this call as it can change skb-\u003ehead.\n\n[1]\n BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321\n __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]\n INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]\n IP6_ECN_decapsulate+0x7df/0x1e50 include/net/inet_ecn.h:321\n ip6ip6_dscp_ecn_decapsulate+0x178/0x1b0 net/ipv6/ip6_tunnel.c:727\n __ip6_tnl_rcv+0xd4e/0x1590 net/ipv6/ip6_tunnel.c:845\n ip6_tnl_rcv+0xce/0x100 net/ipv6/ip6_tunnel.c:888\n gre_rcv+0x143f/0x1870\n ip6_protocol_deliver_rcu+0xda6/0x2a60 net/ipv6/ip6_input.c:438\n ip6_input_finish net/ipv6/ip6_input.c:483 [inline]\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ip6_input+0x15d/0x430 net/ipv6/ip6_input.c:492\n ip6_mc_input+0xa7e/0xc80 net/ipv6/ip6_input.c:586\n dst_input include/net/dst.h:461 [inline]\n ip6_rcv_finish+0x5db/0x870 net/ipv6/ip6_input.c:79\n NF_HOOK include/linux/netfilter.h:314 [inline]\n ipv6_rcv+0xda/0x390 net/ipv6/ip6_input.c:310\n __netif_receive_skb_one_core net/core/dev.c:5532 [inline]\n __netif_receive_skb+0x1a6/0x5a0 net/core/dev.c:5646\n netif_receive_skb_internal net/core/dev.c:5732 [inline]\n netif_receive_skb+0x58/0x660 net/core/dev.c:5791\n tun_rx_batched+0x3ee/0x980 drivers/net/tun.c:1555\n tun_get_user+0x53af/0x66d0 drivers/net/tun.c:2002\n tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n call_write_iter include/linux/fs.h:2084 [inline]\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x786/0x1200 fs/read_write.c:590\n ksys_write+0x20f/0x4c0 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x93/0xd0 fs/read_write.c:652\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560\n __alloc_skb+0x318/0x740 net/core/skbuff.c:651\n alloc_skb include/linux/skbuff.h:1286 [inline]\n alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334\n sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787\n tun_alloc_skb drivers/net/tun.c:1531 [inline]\n tun_get_user+0x1e8a/0x66d0 drivers/net/tun.c:1846\n tun_chr_write_iter+0x3af/0x5d0 drivers/net/tun.c:2048\n call_write_iter include/linux/fs.h:2084 [inline]\n new_sync_write fs/read_write.c:497 [inline]\n vfs_write+0x786/0x1200 fs/read_write.c:590\n ksys_write+0x20f/0x4c0 fs/read_write.c:643\n __do_sys_write fs/read_write.c:655 [inline]\n __se_sys_write fs/read_write.c:652 [inline]\n __x64_sys_write+0x93/0xd0 fs/read_write.c:652\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nCPU: 0 PID: 5034 Comm: syz-executor331 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26641",
"url": "https://www.suse.com/security/cve/CVE-2024-26641"
},
{
"category": "external",
"summary": "SUSE Bug 1221654 for CVE-2024-26641",
"url": "https://bugzilla.suse.com/1221654"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26641"
},
{
"cve": "CVE-2024-26679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26679"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ninet: read sk-\u003esk_family once in inet_recv_error()\n\ninet_recv_error() is called without holding the socket lock.\n\nIPv6 socket could mutate to IPv4 with IPV6_ADDRFORM\nsocket option and trigger a KCSAN warning.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26679",
"url": "https://www.suse.com/security/cve/CVE-2024-26679"
},
{
"category": "external",
"summary": "SUSE Bug 1222385 for CVE-2024-26679",
"url": "https://bugzilla.suse.com/1222385"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26679"
},
{
"cve": "CVE-2024-26687",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26687"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/events: close evtchn after mapping cleanup\n\nshutdown_pirq and startup_pirq are not taking the\nirq_mapping_update_lock because they can\u0027t due to lock inversion. Both\nare called with the irq_desc-\u003elock being taking. The lock order,\nhowever, is first irq_mapping_update_lock and then irq_desc-\u003elock.\n\nThis opens multiple races:\n- shutdown_pirq can be interrupted by a function that allocates an event\n channel:\n\n CPU0 CPU1\n shutdown_pirq {\n xen_evtchn_close(e)\n __startup_pirq {\n EVTCHNOP_bind_pirq\n -\u003e returns just freed evtchn e\n set_evtchn_to_irq(e, irq)\n }\n xen_irq_info_cleanup() {\n set_evtchn_to_irq(e, -1)\n }\n }\n\n Assume here event channel e refers here to the same event channel\n number.\n After this race the evtchn_to_irq mapping for e is invalid (-1).\n\n- __startup_pirq races with __unbind_from_irq in a similar way. Because\n __startup_pirq doesn\u0027t take irq_mapping_update_lock it can grab the\n evtchn that __unbind_from_irq is currently freeing and cleaning up. In\n this case even though the event channel is allocated, its mapping can\n be unset in evtchn_to_irq.\n\nThe fix is to first cleanup the mappings and then close the event\nchannel. In this way, when an event channel gets allocated it\u0027s\npotential previous evtchn_to_irq mappings are guaranteed to be unset already.\nThis is also the reverse order of the allocation where first the event\nchannel is allocated and then the mappings are setup.\n\nOn a 5.10 kernel prior to commit 3fcdaf3d7634 (\"xen/events: modify internal\n[un]bind interfaces\"), we hit a BUG like the following during probing of NVMe\ndevices. The issue is that during nvme_setup_io_queues, pci_free_irq\nis called for every device which results in a call to shutdown_pirq.\nWith many nvme devices it\u0027s therefore likely to hit this race during\nboot because there will be multiple calls to shutdown_pirq and\nstartup_pirq are running potentially in parallel.\n\n ------------[ cut here ]------------\n blkfront: xvda: barrier or flush: disabled; persistent grants: enabled; indirect descriptors: enabled; bounce buffer: enabled\n kernel BUG at drivers/xen/events/events_base.c:499!\n invalid opcode: 0000 [#1] SMP PTI\n CPU: 44 PID: 375 Comm: kworker/u257:23 Not tainted 5.10.201-191.748.amzn2.x86_64 #1\n Hardware name: Xen HVM domU, BIOS 4.11.amazon 08/24/2006\n Workqueue: nvme-reset-wq nvme_reset_work\n RIP: 0010:bind_evtchn_to_cpu+0xdf/0xf0\n Code: 5d 41 5e c3 cc cc cc cc 44 89 f7 e8 2b 55 ad ff 49 89 c5 48 85 c0 0f 84 64 ff ff ff 4c 8b 68 30 41 83 fe ff 0f 85 60 ff ff ff \u003c0f\u003e 0b 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 0f 1f 44 00 00\n RSP: 0000:ffffc9000d533b08 EFLAGS: 00010046\n RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000006\n RDX: 0000000000000028 RSI: 00000000ffffffff RDI: 00000000ffffffff\n RBP: ffff888107419680 R08: 0000000000000000 R09: ffffffff82d72b00\n R10: 0000000000000000 R11: 0000000000000000 R12: 00000000000001ed\n R13: 0000000000000000 R14: 00000000ffffffff R15: 0000000000000002\n FS: 0000000000000000(0000) GS:ffff88bc8b500000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 0000000000000000 CR3: 0000000002610001 CR4: 00000000001706e0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n ? show_trace_log_lvl+0x1c1/0x2d9\n ? show_trace_log_lvl+0x1c1/0x2d9\n ? set_affinity_irq+0xdc/0x1c0\n ? __die_body.cold+0x8/0xd\n ? die+0x2b/0x50\n ? do_trap+0x90/0x110\n ? bind_evtchn_to_cpu+0xdf/0xf0\n ? do_error_trap+0x65/0x80\n ? bind_evtchn_to_cpu+0xdf/0xf0\n ? exc_invalid_op+0x4e/0x70\n ? bind_evtchn_to_cpu+0xdf/0xf0\n ? asm_exc_invalid_op+0x12/0x20\n ? bind_evtchn_to_cpu+0xdf/0x\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26687",
"url": "https://www.suse.com/security/cve/CVE-2024-26687"
},
{
"category": "external",
"summary": "SUSE Bug 1222435 for CVE-2024-26687",
"url": "https://bugzilla.suse.com/1222435"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26687"
},
{
"cve": "CVE-2024-26720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26720"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26720",
"url": "https://www.suse.com/security/cve/CVE-2024-26720"
},
{
"category": "external",
"summary": "SUSE Bug 1222364 for CVE-2024-26720",
"url": "https://bugzilla.suse.com/1222364"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26720"
},
{
"cve": "CVE-2024-26813",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26813"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvfio/platform: Create persistent IRQ handlers\n\nThe vfio-platform SET_IRQS ioctl currently allows loopback triggering of\nan interrupt before a signaling eventfd has been configured by the user,\nwhich thereby allows a NULL pointer dereference.\n\nRather than register the IRQ relative to a valid trigger, register all\nIRQs in a disabled state in the device open path. This allows mask\noperations on the IRQ to nest within the overall enable state governed\nby a valid eventfd signal. This decouples @masked, protected by the\n@locked spinlock from @trigger, protected via the @igate mutex.\n\nIn doing so, it\u0027s guaranteed that changes to @trigger cannot race the\nIRQ handlers because the IRQ handler is synchronously disabled before\nmodifying the trigger, and loopback triggering of the IRQ via ioctl is\nsafe due to serialization with trigger changes via igate.\n\nFor compatibility, request_irq() failures are maintained to be local to\nthe SET_IRQS ioctl rather than a fatal error in the open device path.\nThis allows, for example, a userspace driver with polling mode support\nto continue to work regardless of moving the request_irq() call site.\nThis necessarily blocks all SET_IRQS access to the failed index.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26813",
"url": "https://www.suse.com/security/cve/CVE-2024-26813"
},
{
"category": "external",
"summary": "SUSE Bug 1222809 for CVE-2024-26813",
"url": "https://bugzilla.suse.com/1222809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26813"
},
{
"cve": "CVE-2024-26845",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26845"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: core: Add TMF to tmr_list handling\n\nAn abort that is responded to by iSCSI itself is added to tmr_list but does\nnot go to target core. A LUN_RESET that goes through tmr_list takes a\nrefcounter on the abort and waits for completion. However, the abort will\nbe never complete because it was not started in target core.\n\n Unable to locate ITT: 0x05000000 on CID: 0\n Unable to locate RefTaskTag: 0x05000000 on CID: 0.\n wait_for_tasks: Stopping tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop\n wait for tasks: tmf LUN_RESET with tag 0x0 ref_task_tag 0x0 i_state 34 t_state ISTATE_PROCESSING refcnt 2 transport_state active,stop,fabric_stop\n...\n INFO: task kworker/0:2:49 blocked for more than 491 seconds.\n task:kworker/0:2 state:D stack: 0 pid: 49 ppid: 2 flags:0x00000800\n Workqueue: events target_tmr_work [target_core_mod]\nCall Trace:\n __switch_to+0x2c4/0x470\n _schedule+0x314/0x1730\n schedule+0x64/0x130\n schedule_timeout+0x168/0x430\n wait_for_completion+0x140/0x270\n target_put_cmd_and_wait+0x64/0xb0 [target_core_mod]\n core_tmr_lun_reset+0x30/0xa0 [target_core_mod]\n target_tmr_work+0xc8/0x1b0 [target_core_mod]\n process_one_work+0x2d4/0x5d0\n worker_thread+0x78/0x6c0\n\nTo fix this, only add abort to tmr_list if it will be handled by target\ncore.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26845",
"url": "https://www.suse.com/security/cve/CVE-2024-26845"
},
{
"category": "external",
"summary": "SUSE Bug 1223018 for CVE-2024-26845",
"url": "https://bugzilla.suse.com/1223018"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26845"
},
{
"cve": "CVE-2024-26863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26863"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nhsr: Fix uninit-value access in hsr_get_node()\n\nKMSAN reported the following uninit-value access issue [1]:\n\n=====================================================\nBUG: KMSAN: uninit-value in hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246\n hsr_get_node+0xa2e/0xa40 net/hsr/hsr_framereg.c:246\n fill_frame_info net/hsr/hsr_forward.c:577 [inline]\n hsr_forward_skb+0xe12/0x30e0 net/hsr/hsr_forward.c:615\n hsr_dev_xmit+0x1a1/0x270 net/hsr/hsr_device.c:223\n __netdev_start_xmit include/linux/netdevice.h:4940 [inline]\n netdev_start_xmit include/linux/netdevice.h:4954 [inline]\n xmit_one net/core/dev.c:3548 [inline]\n dev_hard_start_xmit+0x247/0xa10 net/core/dev.c:3564\n __dev_queue_xmit+0x33b8/0x5130 net/core/dev.c:4349\n dev_queue_xmit include/linux/netdevice.h:3134 [inline]\n packet_xmit+0x9c/0x6b0 net/packet/af_packet.c:276\n packet_snd net/packet/af_packet.c:3087 [inline]\n packet_sendmsg+0x8b1d/0x9f30 net/packet/af_packet.c:3119\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n __sys_sendto+0x735/0xa10 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nUninit was created at:\n slab_post_alloc_hook+0x129/0xa70 mm/slab.h:768\n slab_alloc_node mm/slub.c:3478 [inline]\n kmem_cache_alloc_node+0x5e9/0xb10 mm/slub.c:3523\n kmalloc_reserve+0x13d/0x4a0 net/core/skbuff.c:560\n __alloc_skb+0x318/0x740 net/core/skbuff.c:651\n alloc_skb include/linux/skbuff.h:1286 [inline]\n alloc_skb_with_frags+0xc8/0xbd0 net/core/skbuff.c:6334\n sock_alloc_send_pskb+0xa80/0xbf0 net/core/sock.c:2787\n packet_alloc_skb net/packet/af_packet.c:2936 [inline]\n packet_snd net/packet/af_packet.c:3030 [inline]\n packet_sendmsg+0x70e8/0x9f30 net/packet/af_packet.c:3119\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg net/socket.c:745 [inline]\n __sys_sendto+0x735/0xa10 net/socket.c:2191\n __do_sys_sendto net/socket.c:2203 [inline]\n __se_sys_sendto net/socket.c:2199 [inline]\n __x64_sys_sendto+0x125/0x1c0 net/socket.c:2199\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0x6d/0x140 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x63/0x6b\n\nCPU: 1 PID: 5033 Comm: syz-executor334 Not tainted 6.7.0-syzkaller-00562-g9f8413c4a66f #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/17/2023\n=====================================================\n\nIf the packet type ID field in the Ethernet header is either ETH_P_PRP or\nETH_P_HSR, but it is not followed by an HSR tag, hsr_get_skb_sequence_nr()\nreads an invalid value as a sequence number. This causes the above issue.\n\nThis patch fixes the issue by returning NULL if the Ethernet header is not\nfollowed by an HSR tag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26863",
"url": "https://www.suse.com/security/cve/CVE-2024-26863"
},
{
"category": "external",
"summary": "SUSE Bug 1223021 for CVE-2024-26863",
"url": "https://bugzilla.suse.com/1223021"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26863"
},
{
"cve": "CVE-2024-26894",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26894"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: processor_idle: Fix memory leak in acpi_processor_power_exit()\n\nAfter unregistering the CPU idle device, the memory associated with\nit is not freed, leading to a memory leak:\n\nunreferenced object 0xffff896282f6c000 (size 1024):\n comm \"swapper/0\", pid 1, jiffies 4294893170\n hex dump (first 32 bytes):\n 00 00 00 00 0b 00 00 00 00 00 00 00 00 00 00 00 ................\n 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................\n backtrace (crc 8836a742):\n [\u003cffffffff993495ed\u003e] kmalloc_trace+0x29d/0x340\n [\u003cffffffff9972f3b3\u003e] acpi_processor_power_init+0xf3/0x1c0\n [\u003cffffffff9972d263\u003e] __acpi_processor_start+0xd3/0xf0\n [\u003cffffffff9972d2bc\u003e] acpi_processor_start+0x2c/0x50\n [\u003cffffffff99805872\u003e] really_probe+0xe2/0x480\n [\u003cffffffff99805c98\u003e] __driver_probe_device+0x78/0x160\n [\u003cffffffff99805daf\u003e] driver_probe_device+0x1f/0x90\n [\u003cffffffff9980601e\u003e] __driver_attach+0xce/0x1c0\n [\u003cffffffff99803170\u003e] bus_for_each_dev+0x70/0xc0\n [\u003cffffffff99804822\u003e] bus_add_driver+0x112/0x210\n [\u003cffffffff99807245\u003e] driver_register+0x55/0x100\n [\u003cffffffff9aee4acb\u003e] acpi_processor_driver_init+0x3b/0xc0\n [\u003cffffffff990012d1\u003e] do_one_initcall+0x41/0x300\n [\u003cffffffff9ae7c4b0\u003e] kernel_init_freeable+0x320/0x470\n [\u003cffffffff99b231f6\u003e] kernel_init+0x16/0x1b0\n [\u003cffffffff99042e6d\u003e] ret_from_fork+0x2d/0x50\n\nFix this by freeing the CPU idle device after unregistering it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26894",
"url": "https://www.suse.com/security/cve/CVE-2024-26894"
},
{
"category": "external",
"summary": "SUSE Bug 1223043 for CVE-2024-26894",
"url": "https://bugzilla.suse.com/1223043"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26894"
},
{
"cve": "CVE-2024-26923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix garbage collector racing against connect()\n\nGarbage collector does not take into account the risk of embryo getting\nenqueued during the garbage collection. If such embryo has a peer that\ncarries SCM_RIGHTS, two consecutive passes of scan_children() may see a\ndifferent set of children. Leading to an incorrectly elevated inflight\ncount, and then a dangling pointer within the gc_inflight_list.\n\nsockets are AF_UNIX/SOCK_STREAM\nS is an unconnected socket\nL is a listening in-flight socket bound to addr, not in fdtable\nV\u0027s fd will be passed via sendmsg(), gets inflight count bumped\n\nconnect(S, addr)\tsendmsg(S, [V]); close(V)\t__unix_gc()\n----------------\t-------------------------\t-----------\n\nNS = unix_create1()\nskb1 = sock_wmalloc(NS)\nL = unix_find_other(addr)\nunix_state_lock(L)\nunix_peer(S) = NS\n\t\t\t// V count=1 inflight=0\n\n \t\t\tNS = unix_peer(S)\n \t\t\tskb2 = sock_alloc()\n\t\t\tskb_queue_tail(NS, skb2[V])\n\n\t\t\t// V became in-flight\n\t\t\t// V count=2 inflight=1\n\n\t\t\tclose(V)\n\n\t\t\t// V count=1 inflight=1\n\t\t\t// GC candidate condition met\n\n\t\t\t\t\t\tfor u in gc_inflight_list:\n\t\t\t\t\t\t if (total_refs == inflight_refs)\n\t\t\t\t\t\t add u to gc_candidates\n\n\t\t\t\t\t\t// gc_candidates={L, V}\n\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t scan_children(u, dec_inflight)\n\n\t\t\t\t\t\t// embryo (skb1) was not\n\t\t\t\t\t\t// reachable from L yet, so V\u0027s\n\t\t\t\t\t\t// inflight remains unchanged\n__skb_queue_tail(L, skb1)\nunix_state_unlock(L)\n\t\t\t\t\t\tfor u in gc_candidates:\n\t\t\t\t\t\t if (u.inflight)\n\t\t\t\t\t\t scan_children(u, inc_inflight_move_tail)\n\n\t\t\t\t\t\t// V count=1 inflight=2 (!)\n\nIf there is a GC-candidate listening socket, lock/unlock its state. This\nmakes GC wait until the end of any ongoing connect() to that socket. After\nflipping the lock, a possibly SCM-laden embryo is already enqueued. And if\nthere is another embryo coming, it can not possibly carry SCM_RIGHTS. At\nthis point, unix_inflight() can not happen because unix_gc_lock is already\ntaken. Inflight graph remains unaffected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26923",
"url": "https://www.suse.com/security/cve/CVE-2024-26923"
},
{
"category": "external",
"summary": "SUSE Bug 1223384 for CVE-2024-26923",
"url": "https://bugzilla.suse.com/1223384"
},
{
"category": "external",
"summary": "SUSE Bug 1223683 for CVE-2024-26923",
"url": "https://bugzilla.suse.com/1223683"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26923"
},
{
"cve": "CVE-2024-26928",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26928"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_debug_files_proc_show()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26928",
"url": "https://www.suse.com/security/cve/CVE-2024-26928"
},
{
"category": "external",
"summary": "SUSE Bug 1223532 for CVE-2024-26928",
"url": "https://bugzilla.suse.com/1223532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26928"
},
{
"cve": "CVE-2024-26973",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-26973"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfat: fix uninitialized field in nostale filehandles\n\nWhen fat_encode_fh_nostale() encodes file handle without a parent it\nstores only first 10 bytes of the file handle. However the length of the\nfile handle must be a multiple of 4 so the file handle is actually 12\nbytes long and the last two bytes remain uninitialized. This is not\ngreat at we potentially leak uninitialized information with the handle\nto userspace. Properly initialize the full handle length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-26973",
"url": "https://www.suse.com/security/cve/CVE-2024-26973"
},
{
"category": "external",
"summary": "SUSE Bug 1223641 for CVE-2024-26973",
"url": "https://bugzilla.suse.com/1223641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-26973"
},
{
"cve": "CVE-2024-27399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27399"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: l2cap: fix null-ptr-deref in l2cap_chan_timeout\n\nThere is a race condition between l2cap_chan_timeout() and\nl2cap_chan_del(). When we use l2cap_chan_del() to delete the\nchannel, the chan-\u003econn will be set to null. But the conn could\nbe dereferenced again in the mutex_lock() of l2cap_chan_timeout().\nAs a result the null pointer dereference bug will happen. The\nKASAN report triggered by POC is shown below:\n\n[ 472.074580] ==================================================================\n[ 472.075284] BUG: KASAN: null-ptr-deref in mutex_lock+0x68/0xc0\n[ 472.075308] Write of size 8 at addr 0000000000000158 by task kworker/0:0/7\n[ 472.075308]\n[ 472.075308] CPU: 0 PID: 7 Comm: kworker/0:0 Not tainted 6.9.0-rc5-00356-g78c0094a146b #36\n[ 472.075308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[ 472.075308] Workqueue: events l2cap_chan_timeout\n[ 472.075308] Call Trace:\n[ 472.075308] \u003cTASK\u003e\n[ 472.075308] dump_stack_lvl+0x137/0x1a0\n[ 472.075308] print_report+0x101/0x250\n[ 472.075308] ? __virt_addr_valid+0x77/0x160\n[ 472.075308] ? mutex_lock+0x68/0xc0\n[ 472.075308] kasan_report+0x139/0x170\n[ 472.075308] ? mutex_lock+0x68/0xc0\n[ 472.075308] kasan_check_range+0x2c3/0x2e0\n[ 472.075308] mutex_lock+0x68/0xc0\n[ 472.075308] l2cap_chan_timeout+0x181/0x300\n[ 472.075308] process_one_work+0x5d2/0xe00\n[ 472.075308] worker_thread+0xe1d/0x1660\n[ 472.075308] ? pr_cont_work+0x5e0/0x5e0\n[ 472.075308] kthread+0x2b7/0x350\n[ 472.075308] ? pr_cont_work+0x5e0/0x5e0\n[ 472.075308] ? kthread_blkcg+0xd0/0xd0\n[ 472.075308] ret_from_fork+0x4d/0x80\n[ 472.075308] ? kthread_blkcg+0xd0/0xd0\n[ 472.075308] ret_from_fork_asm+0x11/0x20\n[ 472.075308] \u003c/TASK\u003e\n[ 472.075308] ==================================================================\n[ 472.094860] Disabling lock debugging due to kernel taint\n[ 472.096136] BUG: kernel NULL pointer dereference, address: 0000000000000158\n[ 472.096136] #PF: supervisor write access in kernel mode\n[ 472.096136] #PF: error_code(0x0002) - not-present page\n[ 472.096136] PGD 0 P4D 0\n[ 472.096136] Oops: 0002 [#1] PREEMPT SMP KASAN NOPTI\n[ 472.096136] CPU: 0 PID: 7 Comm: kworker/0:0 Tainted: G B 6.9.0-rc5-00356-g78c0094a146b #36\n[ 472.096136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu4\n[ 472.096136] Workqueue: events l2cap_chan_timeout\n[ 472.096136] RIP: 0010:mutex_lock+0x88/0xc0\n[ 472.096136] Code: be 08 00 00 00 e8 f8 23 1f fd 4c 89 f7 be 08 00 00 00 e8 eb 23 1f fd 42 80 3c 23 00 74 08 48 88\n[ 472.096136] RSP: 0018:ffff88800744fc78 EFLAGS: 00000246\n[ 472.096136] RAX: 0000000000000000 RBX: 1ffff11000e89f8f RCX: ffffffff8457c865\n[ 472.096136] RDX: 0000000000000001 RSI: 0000000000000008 RDI: ffff88800744fc78\n[ 472.096136] RBP: 0000000000000158 R08: ffff88800744fc7f R09: 1ffff11000e89f8f\n[ 472.096136] R10: dffffc0000000000 R11: ffffed1000e89f90 R12: dffffc0000000000\n[ 472.096136] R13: 0000000000000158 R14: ffff88800744fc78 R15: ffff888007405a00\n[ 472.096136] FS: 0000000000000000(0000) GS:ffff88806d200000(0000) knlGS:0000000000000000\n[ 472.096136] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 472.096136] CR2: 0000000000000158 CR3: 000000000da32000 CR4: 00000000000006f0\n[ 472.096136] Call Trace:\n[ 472.096136] \u003cTASK\u003e\n[ 472.096136] ? __die_body+0x8d/0xe0\n[ 472.096136] ? page_fault_oops+0x6b8/0x9a0\n[ 472.096136] ? kernelmode_fixup_or_oops+0x20c/0x2a0\n[ 472.096136] ? do_user_addr_fault+0x1027/0x1340\n[ 472.096136] ? _printk+0x7a/0xa0\n[ 472.096136] ? mutex_lock+0x68/0xc0\n[ 472.096136] ? add_taint+0x42/0xd0\n[ 472.096136] ? exc_page_fault+0x6a/0x1b0\n[ 472.096136] ? asm_exc_page_fault+0x26/0x30\n[ 472.096136] ? mutex_lock+0x75/0xc0\n[ 472.096136] ? mutex_lock+0x88/0xc0\n[ 472.096136] ? mutex_lock+0x75/0xc0\n[ 472.096136] l2cap_chan_timeo\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27399",
"url": "https://www.suse.com/security/cve/CVE-2024-27399"
},
{
"category": "external",
"summary": "SUSE Bug 1224177 for CVE-2024-27399",
"url": "https://bugzilla.suse.com/1224177"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-27399"
},
{
"cve": "CVE-2024-27410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-27410"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: nl80211: reject iftype change with mesh ID change\n\nIt\u0027s currently possible to change the mesh ID when the\ninterface isn\u0027t yet in mesh mode, at the same time as\nchanging it into mesh mode. This leads to an overwrite\nof data in the wdev-\u003eu union for the interface type it\ncurrently has, causing cfg80211_change_iface() to do\nwrong things when switching.\n\nWe could probably allow setting an interface to mesh\nwhile setting the mesh ID at the same time by doing a\ndifferent order of operations here, but realistically\nthere\u0027s no userspace that\u0027s going to do this, so just\ndisallow changes in iftype when setting mesh ID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-27410",
"url": "https://www.suse.com/security/cve/CVE-2024-27410"
},
{
"category": "external",
"summary": "SUSE Bug 1224432 for CVE-2024-27410",
"url": "https://bugzilla.suse.com/1224432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-27410"
},
{
"cve": "CVE-2024-35247",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35247"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: region: add owner module and take its refcount\n\nThe current implementation of the fpga region assumes that the low-level\nmodule registers a driver for the parent device and uses its owner pointer\nto take the module\u0027s refcount. This approach is problematic since it can\nlead to a null pointer dereference while attempting to get the region\nduring programming if the parent device does not have a driver.\n\nTo address this problem, add a module owner pointer to the fpga_region\nstruct and use it to take the module\u0027s refcount. Modify the functions for\nregistering a region to take an additional owner module parameter and\nrename them to avoid conflicts. Use the old function names for helper\nmacros that automatically set the module that registers the region as the\nowner. This ensures compatibility with existing low-level control modules\nand reduces the chances of registering a region without setting the owner.\n\nAlso, update the documentation to keep it consistent with the new interface\nfor registering an fpga region.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35247",
"url": "https://www.suse.com/security/cve/CVE-2024-35247"
},
{
"category": "external",
"summary": "SUSE Bug 1226948 for CVE-2024-35247",
"url": "https://bugzilla.suse.com/1226948"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35247"
},
{
"cve": "CVE-2024-35807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35807"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix corruption during on-line resize\n\nWe observed a corruption during on-line resize of a file system that is\nlarger than 16 TiB with 4k block size. With having more then 2^32 blocks\nresize_inode is turned off by default by mke2fs. The issue can be\nreproduced on a smaller file system for convenience by explicitly\nturning off resize_inode. An on-line resize across an 8 GiB boundary (the\nsize of a meta block group in this setup) then leads to a corruption:\n\n dev=/dev/\u003csome_dev\u003e # should be \u003e= 16 GiB\n mkdir -p /corruption\n /sbin/mke2fs -t ext4 -b 4096 -O ^resize_inode $dev $((2 * 2**21 - 2**15))\n mount -t ext4 $dev /corruption\n\n dd if=/dev/zero bs=4096 of=/corruption/test count=$((2*2**21 - 4*2**15))\n sha1sum /corruption/test\n # 79d2658b39dcfd77274e435b0934028adafaab11 /corruption/test\n\n /sbin/resize2fs $dev $((2*2**21))\n # drop page cache to force reload the block from disk\n echo 1 \u003e /proc/sys/vm/drop_caches\n\n sha1sum /corruption/test\n # 3c2abc63cbf1a94c9e6977e0fbd72cd832c4d5c3 /corruption/test\n\n2^21 = 2^15*2^6 equals 8 GiB whereof 2^15 is the number of blocks per\nblock group and 2^6 are the number of block groups that make a meta\nblock group.\n\nThe last checksum might be different depending on how the file is laid\nout across the physical blocks. The actual corruption occurs at physical\nblock 63*2^15 = 2064384 which would be the location of the backup of the\nmeta block group\u0027s block descriptor. During the on-line resize the file\nsystem will be converted to meta_bg starting at s_first_meta_bg which is\n2 in the example - meaning all block groups after 16 GiB. However, in\next4_flex_group_add we might add block groups that are not part of the\nfirst meta block group yet. In the reproducer we achieved this by\nsubstracting the size of a whole block group from the point where the\nmeta block group would start. This must be considered when updating the\nbackup block group descriptors to follow the non-meta_bg layout. The fix\nis to add a test whether the group to add is already part of the meta\nblock group or not.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35807",
"url": "https://www.suse.com/security/cve/CVE-2024-35807"
},
{
"category": "external",
"summary": "SUSE Bug 1224735 for CVE-2024-35807",
"url": "https://bugzilla.suse.com/1224735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35807"
},
{
"cve": "CVE-2024-35822",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35822"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: udc: remove warning when queue disabled ep\n\nIt is possible trigger below warning message from mass storage function,\n\nWARNING: CPU: 6 PID: 3839 at drivers/usb/gadget/udc/core.c:294 usb_ep_queue+0x7c/0x104\npc : usb_ep_queue+0x7c/0x104\nlr : fsg_main_thread+0x494/0x1b3c\n\nRoot cause is mass storage function try to queue request from main thread,\nbut other thread may already disable ep when function disable.\n\nAs there is no function failure in the driver, in order to avoid effort\nto fix warning, change WARN_ON_ONCE() in usb_ep_queue() to pr_debug().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35822",
"url": "https://www.suse.com/security/cve/CVE-2024-35822"
},
{
"category": "external",
"summary": "SUSE Bug 1224739 for CVE-2024-35822",
"url": "https://bugzilla.suse.com/1224739"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "low"
}
],
"title": "CVE-2024-35822"
},
{
"cve": "CVE-2024-35835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35835"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: fix a double-free in arfs_create_groups\n\nWhen `in` allocated by kvzalloc fails, arfs_create_groups will free\nft-\u003eg and return an error. However, arfs_create_table, the only caller of\narfs_create_groups, will hold this error and call to\nmlx5e_destroy_flow_table, in which the ft-\u003eg will be freed again.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35835",
"url": "https://www.suse.com/security/cve/CVE-2024-35835"
},
{
"category": "external",
"summary": "SUSE Bug 1224605 for CVE-2024-35835",
"url": "https://bugzilla.suse.com/1224605"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35835"
},
{
"cve": "CVE-2024-35862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35862"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_network_name_deleted()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35862",
"url": "https://www.suse.com/security/cve/CVE-2024-35862"
},
{
"category": "external",
"summary": "SUSE Bug 1224764 for CVE-2024-35862",
"url": "https://bugzilla.suse.com/1224764"
},
{
"category": "external",
"summary": "SUSE Bug 1225311 for CVE-2024-35862",
"url": "https://bugzilla.suse.com/1225311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2024-35862"
},
{
"cve": "CVE-2024-35863",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35863"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in is_valid_oplock_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35863",
"url": "https://www.suse.com/security/cve/CVE-2024-35863"
},
{
"category": "external",
"summary": "SUSE Bug 1224763 for CVE-2024-35863",
"url": "https://bugzilla.suse.com/1224763"
},
{
"category": "external",
"summary": "SUSE Bug 1225011 for CVE-2024-35863",
"url": "https://bugzilla.suse.com/1225011"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2024-35863"
},
{
"cve": "CVE-2024-35864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35864"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_valid_lease_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35864",
"url": "https://www.suse.com/security/cve/CVE-2024-35864"
},
{
"category": "external",
"summary": "SUSE Bug 1224765 for CVE-2024-35864",
"url": "https://bugzilla.suse.com/1224765"
},
{
"category": "external",
"summary": "SUSE Bug 1225309 for CVE-2024-35864",
"url": "https://bugzilla.suse.com/1225309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2024-35864"
},
{
"cve": "CVE-2024-35865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35865"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in smb2_is_valid_oplock_break()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35865",
"url": "https://www.suse.com/security/cve/CVE-2024-35865"
},
{
"category": "external",
"summary": "SUSE Bug 1224668 for CVE-2024-35865",
"url": "https://bugzilla.suse.com/1224668"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35865"
},
{
"cve": "CVE-2024-35867",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35867"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_stats_proc_show()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35867",
"url": "https://www.suse.com/security/cve/CVE-2024-35867"
},
{
"category": "external",
"summary": "SUSE Bug 1224664 for CVE-2024-35867",
"url": "https://bugzilla.suse.com/1224664"
},
{
"category": "external",
"summary": "SUSE Bug 1225012 for CVE-2024-35867",
"url": "https://bugzilla.suse.com/1225012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2024-35867"
},
{
"cve": "CVE-2024-35868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35868"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix potential UAF in cifs_stats_proc_write()\n\nSkip sessions that are being teared down (status == SES_EXITING) to\navoid UAF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35868",
"url": "https://www.suse.com/security/cve/CVE-2024-35868"
},
{
"category": "external",
"summary": "SUSE Bug 1224678 for CVE-2024-35868",
"url": "https://bugzilla.suse.com/1224678"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35868"
},
{
"cve": "CVE-2024-35870",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35870"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix UAF in smb2_reconnect_server()\n\nThe UAF bug is due to smb2_reconnect_server() accessing a session that\nis already being teared down by another thread that is executing\n__cifs_put_smb_ses(). This can happen when (a) the client has\nconnection to the server but no session or (b) another thread ends up\nsetting @ses-\u003eses_status again to something different than\nSES_EXITING.\n\nTo fix this, we need to make sure to unconditionally set\n@ses-\u003eses_status to SES_EXITING and prevent any other threads from\nsetting a new status while we\u0027re still tearing it down.\n\nThe following can be reproduced by adding some delay to right after\nthe ipc is freed in __cifs_put_smb_ses() - which will give\nsmb2_reconnect_server() worker a chance to run and then accessing\n@ses-\u003eipc:\n\nkinit ...\nmount.cifs //srv/share /mnt/1 -o sec=krb5,nohandlecache,echo_interval=10\n[disconnect srv]\nls /mnt/1 \u0026\u003e/dev/null\nsleep 30\nkdestroy\n[reconnect srv]\nsleep 10\numount /mnt/1\n...\nCIFS: VFS: Verify user has a krb5 ticket and keyutils is installed\nCIFS: VFS: \\\\srv Send error in SessSetup = -126\nCIFS: VFS: Verify user has a krb5 ticket and keyutils is installed\nCIFS: VFS: \\\\srv Send error in SessSetup = -126\ngeneral protection fault, probably for non-canonical address\n0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP NOPTI\nCPU: 3 PID: 50 Comm: kworker/3:1 Not tainted 6.9.0-rc2 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-1.fc39\n04/01/2014\nWorkqueue: cifsiod smb2_reconnect_server [cifs]\nRIP: 0010:__list_del_entry_valid_or_report+0x33/0xf0\nCode: 4f 08 48 85 d2 74 42 48 85 c9 74 59 48 b8 00 01 00 00 00 00 ad\nde 48 39 c2 74 61 48 b8 22 01 00 00 00 00 74 69 \u003c48\u003e 8b 01 48 39 f8 75\n7b 48 8b 72 08 48 39 c6 0f 85 88 00 00 00 b8\nRSP: 0018:ffffc900001bfd70 EFLAGS: 00010a83\nRAX: dead000000000122 RBX: ffff88810da53838 RCX: 6b6b6b6b6b6b6b6b\nRDX: 6b6b6b6b6b6b6b6b RSI: ffffffffc02f6878 RDI: ffff88810da53800\nRBP: ffff88810da53800 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000001 R12: ffff88810c064000\nR13: 0000000000000001 R14: ffff88810c064000 R15: ffff8881039cc000\nFS: 0000000000000000(0000) GS:ffff888157c00000(0000)\nknlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007fe3728b1000 CR3: 000000010caa4000 CR4: 0000000000750ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n ? die_addr+0x36/0x90\n ? exc_general_protection+0x1c1/0x3f0\n ? asm_exc_general_protection+0x26/0x30\n ? __list_del_entry_valid_or_report+0x33/0xf0\n __cifs_put_smb_ses+0x1ae/0x500 [cifs]\n smb2_reconnect_server+0x4ed/0x710 [cifs]\n process_one_work+0x205/0x6b0\n worker_thread+0x191/0x360\n ? __pfx_worker_thread+0x10/0x10\n kthread+0xe2/0x110\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x50\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35870",
"url": "https://www.suse.com/security/cve/CVE-2024-35870"
},
{
"category": "external",
"summary": "SUSE Bug 1224672 for CVE-2024-35870",
"url": "https://bugzilla.suse.com/1224672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35870"
},
{
"cve": "CVE-2024-35886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35886"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix infinite recursion in fib6_dump_done().\n\nsyzkaller reported infinite recursive calls of fib6_dump_done() during\nnetlink socket destruction. [1]\n\nFrom the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then\nthe response was generated. The following recvmmsg() resumed the dump\nfor IPv6, but the first call of inet6_dump_fib() failed at kzalloc() due\nto the fault injection. [0]\n\n 12:01:34 executing program 3:\n r0 = socket$nl_route(0x10, 0x3, 0x0)\n sendmsg$nl_route(r0, ... snip ...)\n recvmmsg(r0, ... snip ...) (fail_nth: 8)\n\nHere, fib6_dump_done() was set to nlk_sk(sk)-\u003ecb.done, and the next call\nof inet6_dump_fib() set it to nlk_sk(sk)-\u003ecb.args[3]. syzkaller stopped\nreceiving the response halfway through, and finally netlink_sock_destruct()\ncalled nlk_sk(sk)-\u003ecb.done().\n\nfib6_dump_done() calls fib6_dump_end() and nlk_sk(sk)-\u003ecb.done() if it\nis still not NULL. fib6_dump_end() rewrites nlk_sk(sk)-\u003ecb.done() by\nnlk_sk(sk)-\u003ecb.args[3], but it has the same function, not NULL, calling\nitself recursively and hitting the stack guard page.\n\nTo avoid the issue, let\u0027s set the destructor after kzalloc().\n\n[0]:\nFAULT_INJECTION: forcing a failure.\nname failslab, interval 1, probability 0, space 0, times 0\nCPU: 1 PID: 432110 Comm: syz-executor.3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl (lib/dump_stack.c:117)\n should_fail_ex (lib/fault-inject.c:52 lib/fault-inject.c:153)\n should_failslab (mm/slub.c:3733)\n kmalloc_trace (mm/slub.c:3748 mm/slub.c:3827 mm/slub.c:3992)\n inet6_dump_fib (./include/linux/slab.h:628 ./include/linux/slab.h:749 net/ipv6/ip6_fib.c:662)\n rtnl_dump_all (net/core/rtnetlink.c:4029)\n netlink_dump (net/netlink/af_netlink.c:2269)\n netlink_recvmsg (net/netlink/af_netlink.c:1988)\n ____sys_recvmsg (net/socket.c:1046 net/socket.c:2801)\n ___sys_recvmsg (net/socket.c:2846)\n do_recvmmsg (net/socket.c:2943)\n __x64_sys_recvmmsg (net/socket.c:3041 net/socket.c:3034 net/socket.c:3034)\n\n[1]:\nBUG: TASK stack guard page was hit at 00000000f2fa9af1 (stack is 00000000b7912430..000000009a436beb)\nstack guard page: 0000 [#1] PREEMPT SMP KASAN\nCPU: 1 PID: 223719 Comm: kworker/1:3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014\nWorkqueue: events netlink_sock_destruct_work\nRIP: 0010:fib6_dump_done (net/ipv6/ip6_fib.c:570)\nCode: 3c 24 e8 f3 e9 51 fd e9 28 fd ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 41 57 41 56 41 55 41 54 55 48 89 fd \u003c53\u003e 48 8d 5d 60 e8 b6 4d 07 fd 48 89 da 48 b8 00 00 00 00 00 fc ff\nRSP: 0018:ffffc9000d980000 EFLAGS: 00010293\nRAX: 0000000000000000 RBX: ffffffff84405990 RCX: ffffffff844059d3\nRDX: ffff8881028e0000 RSI: ffffffff84405ac2 RDI: ffff88810c02f358\nRBP: ffff88810c02f358 R08: 0000000000000007 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000224 R12: 0000000000000000\nR13: ffff888007c82c78 R14: ffff888007c82c68 R15: ffff888007c82c68\nFS: 0000000000000000(0000) GS:ffff88811b100000(0000) knlGS:0000000000000000\nCS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffc9000d97fff8 CR3: 0000000102309002 CR4: 0000000000770ef0\nPKRU: 55555554\nCall Trace:\n \u003c#DF\u003e\n \u003c/#DF\u003e\n \u003cTASK\u003e\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n ...\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))\n netlink_sock_destruct (net/netlink/af_netlink.c:401)\n __sk_destruct (net/core/sock.c:2177 (discriminator 2))\n sk_destruct (net/core/sock.c:2224)\n __sk_free (net/core/sock.c:2235)\n sk_free (net/core/sock.c:2246)\n process_one_work (kernel/workqueue.c:3259)\n worker_thread (kernel/workqueue.c:3329 kernel/workqueue.\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35886",
"url": "https://www.suse.com/security/cve/CVE-2024-35886"
},
{
"category": "external",
"summary": "SUSE Bug 1224670 for CVE-2024-35886",
"url": "https://bugzilla.suse.com/1224670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35886"
},
{
"cve": "CVE-2024-35896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35896"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: validate user input for expected length\n\nI got multiple syzbot reports showing old bugs exposed\nby BPF after commit 20f2505fb436 (\"bpf: Try to avoid kzalloc\nin cgroup/{s,g}etsockopt\")\n\nsetsockopt() @optlen argument should be taken into account\nbefore copying data.\n\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]\n BUG: KASAN: slab-out-of-bounds in do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]\n BUG: KASAN: slab-out-of-bounds in do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627\nRead of size 96 at addr ffff88802cd73da0 by task syz-executor.4/7238\n\nCPU: 1 PID: 7238 Comm: syz-executor.4 Not tainted 6.9.0-rc2-next-20240403-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105\n copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n copy_from_sockptr include/linux/sockptr.h:55 [inline]\n do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]\n do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627\n nf_setsockopt+0x295/0x2c0 net/netfilter/nf_sockopt.c:101\n do_sock_setsockopt+0x3af/0x720 net/socket.c:2311\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x72/0x7a\nRIP: 0033:0x7fd22067dde9\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fd21f9ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036\nRAX: ffffffffffffffda RBX: 00007fd2207abf80 RCX: 00007fd22067dde9\nRDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003\nRBP: 00007fd2206ca47a R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000020000880 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007fd2207abf80 R15: 00007ffd2d0170d8\n \u003c/TASK\u003e\n\nAllocated by task 7238:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:370 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387\n kasan_kmalloc include/linux/kasan.h:211 [inline]\n __do_kmalloc_node mm/slub.c:4069 [inline]\n __kmalloc_noprof+0x200/0x410 mm/slub.c:4082\n kmalloc_noprof include/linux/slab.h:664 [inline]\n __cgroup_bpf_run_filter_setsockopt+0xd47/0x1050 kernel/bpf/cgroup.c:1869\n do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x72/0x7a\n\nThe buggy address belongs to the object at ffff88802cd73da0\n which belongs to the cache kmalloc-8 of size 8\nThe buggy address is located 0 bytes inside of\n allocated 1-byte region [ffff88802cd73da0, ffff88802cd73da1)\n\nThe buggy address belongs to the physical page:\npage: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802cd73020 pfn:0x2cd73\nflags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff)\npage_type: 0xffffefff(slab)\nraw: 00fff80000000000 ffff888015041280 dead000000000100 dead000000000122\nraw: ffff88802cd73020 000000008080007f 00000001ffffefff 00\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35896",
"url": "https://www.suse.com/security/cve/CVE-2024-35896"
},
{
"category": "external",
"summary": "SUSE Bug 1224662 for CVE-2024-35896",
"url": "https://bugzilla.suse.com/1224662"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35896"
},
{
"cve": "CVE-2024-35922",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35922"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbmon: prevent division by zero in fb_videomode_from_videomode()\n\nThe expression htotal * vtotal can have a zero value on\noverflow. It is necessary to prevent division by zero like in\nfb_var_to_videomode().\n\nFound by Linux Verification Center (linuxtesting.org) with Svace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35922",
"url": "https://www.suse.com/security/cve/CVE-2024-35922"
},
{
"category": "external",
"summary": "SUSE Bug 1224660 for CVE-2024-35922",
"url": "https://bugzilla.suse.com/1224660"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35922"
},
{
"cve": "CVE-2024-35925",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35925"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: prevent division by zero in blk_rq_stat_sum()\n\nThe expression dst-\u003enr_samples + src-\u003enr_samples may\nhave zero value on overflow. It is necessary to add\na check to avoid division by zero.\n\nFound by Linux Verification Center (linuxtesting.org) with Svace.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35925",
"url": "https://www.suse.com/security/cve/CVE-2024-35925"
},
{
"category": "external",
"summary": "SUSE Bug 1224661 for CVE-2024-35925",
"url": "https://bugzilla.suse.com/1224661"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35925"
},
{
"cve": "CVE-2024-35930",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35930"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Fix possible memory leak in lpfc_rcv_padisc()\n\nThe call to lpfc_sli4_resume_rpi() in lpfc_rcv_padisc() may return an\nunsuccessful status. In such cases, the elsiocb is not issued, the\ncompletion is not called, and thus the elsiocb resource is leaked.\n\nCheck return value after calling lpfc_sli4_resume_rpi() and conditionally\nrelease the elsiocb resource.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35930",
"url": "https://www.suse.com/security/cve/CVE-2024-35930"
},
{
"category": "external",
"summary": "SUSE Bug 1224651 for CVE-2024-35930",
"url": "https://bugzilla.suse.com/1224651"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35930"
},
{
"cve": "CVE-2024-35950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35950"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/client: Fully protect modes[] with dev-\u003emode_config.mutex\n\nThe modes[] array contains pointers to modes on the connectors\u0027\nmode lists, which are protected by dev-\u003emode_config.mutex.\nThus we need to extend modes[] the same protection or by the\ntime we use it the elements may already be pointing to\nfreed/reused memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35950",
"url": "https://www.suse.com/security/cve/CVE-2024-35950"
},
{
"category": "external",
"summary": "SUSE Bug 1224703 for CVE-2024-35950",
"url": "https://bugzilla.suse.com/1224703"
},
{
"category": "external",
"summary": "SUSE Bug 1225310 for CVE-2024-35950",
"url": "https://bugzilla.suse.com/1225310"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35950"
},
{
"cve": "CVE-2024-35956",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35956"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: qgroup: fix qgroup prealloc rsv leak in subvolume operations\n\nCreate subvolume, create snapshot and delete subvolume all use\nbtrfs_subvolume_reserve_metadata() to reserve metadata for the changes\ndone to the parent subvolume\u0027s fs tree, which cannot be mediated in the\nnormal way via start_transaction. When quota groups (squota or qgroups)\nare enabled, this reserves qgroup metadata of type PREALLOC. Once the\noperation is associated to a transaction, we convert PREALLOC to\nPERTRANS, which gets cleared in bulk at the end of the transaction.\n\nHowever, the error paths of these three operations were not implementing\nthis lifecycle correctly. They unconditionally converted the PREALLOC to\nPERTRANS in a generic cleanup step regardless of errors or whether the\noperation was fully associated to a transaction or not. This resulted in\nerror paths occasionally converting this rsv to PERTRANS without calling\nrecord_root_in_trans successfully, which meant that unless that root got\nrecorded in the transaction by some other thread, the end of the\ntransaction would not free that root\u0027s PERTRANS, leaking it. Ultimately,\nthis resulted in hitting a WARN in CONFIG_BTRFS_DEBUG builds at unmount\nfor the leaked reservation.\n\nThe fix is to ensure that every qgroup PREALLOC reservation observes the\nfollowing properties:\n\n1. any failure before record_root_in_trans is called successfully\n results in freeing the PREALLOC reservation.\n2. after record_root_in_trans, we convert to PERTRANS, and now the\n transaction owns freeing the reservation.\n\nThis patch enforces those properties on the three operations. Without\nit, generic/269 with squotas enabled at mkfs time would fail in ~5-10\nruns on my system. With this patch, it ran successfully 1000 times in a\nrow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35956",
"url": "https://www.suse.com/security/cve/CVE-2024-35956"
},
{
"category": "external",
"summary": "SUSE Bug 1224674 for CVE-2024-35956",
"url": "https://bugzilla.suse.com/1224674"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35956"
},
{
"cve": "CVE-2024-35958",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35958"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ena: Fix incorrect descriptor free behavior\n\nENA has two types of TX queues:\n- queues which only process TX packets arriving from the network stack\n- queues which only process TX packets forwarded to it by XDP_REDIRECT\n or XDP_TX instructions\n\nThe ena_free_tx_bufs() cycles through all descriptors in a TX queue\nand unmaps + frees every descriptor that hasn\u0027t been acknowledged yet\nby the device (uncompleted TX transactions).\nThe function assumes that the processed TX queue is necessarily from\nthe first category listed above and ends up using napi_consume_skb()\nfor descriptors belonging to an XDP specific queue.\n\nThis patch solves a bug in which, in case of a VF reset, the\ndescriptors aren\u0027t freed correctly, leading to crashes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35958",
"url": "https://www.suse.com/security/cve/CVE-2024-35958"
},
{
"category": "external",
"summary": "SUSE Bug 1224677 for CVE-2024-35958",
"url": "https://bugzilla.suse.com/1224677"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35958"
},
{
"cve": "CVE-2024-35960",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35960"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5: Properly link new fs rules into the tree\n\nPreviously, add_rule_fg would only add newly created rules from the\nhandle into the tree when they had a refcount of 1. On the other hand,\ncreate_flow_handle tries hard to find and reference already existing\nidentical rules instead of creating new ones.\n\nThese two behaviors can result in a situation where create_flow_handle\n1) creates a new rule and references it, then\n2) in a subsequent step during the same handle creation references it\n again,\nresulting in a rule with a refcount of 2 that is not linked into the\ntree, will have a NULL parent and root and will result in a crash when\nthe flow group is deleted because del_sw_hw_rule, invoked on rule\ndeletion, assumes node-\u003eparent is != NULL.\n\nThis happened in the wild, due to another bug related to incorrect\nhandling of duplicate pkt_reformat ids, which lead to the code in\ncreate_flow_handle incorrectly referencing a just-added rule in the same\nflow handle, resulting in the problem described above. Full details are\nat [1].\n\nThis patch changes add_rule_fg to add new rules without parents into\nthe tree, properly initializing them and avoiding the crash. This makes\nit more consistent with how rules are added to an FTE in\ncreate_flow_handle.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35960",
"url": "https://www.suse.com/security/cve/CVE-2024-35960"
},
{
"category": "external",
"summary": "SUSE Bug 1224588 for CVE-2024-35960",
"url": "https://bugzilla.suse.com/1224588"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35960"
},
{
"cve": "CVE-2024-35962",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35962"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: complete validation of user input\n\nIn my recent commit, I missed that do_replace() handlers\nuse copy_from_sockptr() (which I fixed), followed\nby unsafe copy_from_sockptr_offset() calls.\n\nIn all functions, we can perform the @optlen validation\nbefore even calling xt_alloc_table_info() with the following\ncheck:\n\nif ((u64)optlen \u003c (u64)tmp.size + sizeof(tmp))\n return -EINVAL;",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35962",
"url": "https://www.suse.com/security/cve/CVE-2024-35962"
},
{
"category": "external",
"summary": "SUSE Bug 1224583 for CVE-2024-35962",
"url": "https://bugzilla.suse.com/1224583"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35962"
},
{
"cve": "CVE-2024-35976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35976"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxsk: validate user input for XDP_{UMEM|COMPLETION}_FILL_RING\n\nsyzbot reported an illegal copy in xsk_setsockopt() [1]\n\nMake sure to validate setsockopt() @optlen parameter.\n\n[1]\n\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]\n BUG: KASAN: slab-out-of-bounds in xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420\nRead of size 4 at addr ffff888028c6cde3 by task syz-executor.0/7549\n\nCPU: 0 PID: 7549 Comm: syz-executor.0 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n copy_from_sockptr include/linux/sockptr.h:55 [inline]\n xsk_setsockopt+0x909/0xa40 net/xdp/xsk.c:1420\n do_sock_setsockopt+0x3af/0x720 net/socket.c:2311\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\nRIP: 0033:0x7fb40587de69\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fb40665a0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036\nRAX: ffffffffffffffda RBX: 00007fb4059abf80 RCX: 00007fb40587de69\nRDX: 0000000000000005 RSI: 000000000000011b RDI: 0000000000000006\nRBP: 00007fb4058ca47a R08: 0000000000000002 R09: 0000000000000000\nR10: 0000000020001980 R11: 0000000000000246 R12: 0000000000000000\nR13: 000000000000000b R14: 00007fb4059abf80 R15: 00007fff57ee4d08\n \u003c/TASK\u003e\n\nAllocated by task 7549:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:370 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387\n kasan_kmalloc include/linux/kasan.h:211 [inline]\n __do_kmalloc_node mm/slub.c:3966 [inline]\n __kmalloc+0x233/0x4a0 mm/slub.c:3979\n kmalloc include/linux/slab.h:632 [inline]\n __cgroup_bpf_run_filter_setsockopt+0xd2f/0x1040 kernel/bpf/cgroup.c:1869\n do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfb/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nThe buggy address belongs to the object at ffff888028c6cde0\n which belongs to the cache kmalloc-8 of size 8\nThe buggy address is located 1 bytes to the right of\n allocated 2-byte region [ffff888028c6cde0, ffff888028c6cde2)\n\nThe buggy address belongs to the physical page:\npage:ffffea0000a31b00 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888028c6c9c0 pfn:0x28c6c\nanon flags: 0xfff00000000800(slab|node=0|zone=1|lastcpupid=0x7ff)\npage_type: 0xffffffff()\nraw: 00fff00000000800 ffff888014c41280 0000000000000000 dead000000000001\nraw: ffff888028c6c9c0 0000000080800057 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\npage_owner tracks the page as allocated\npage last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 6648, tgid 6644 (syz-executor.0), ts 133906047828, free_ts 133859922223\n set_page_owner include/linux/page_owner.h:31 [inline]\n post_alloc_hook+0x1ea/0x210 mm/page_alloc.c:1533\n prep_new_page mm/page_alloc.c:\n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35976",
"url": "https://www.suse.com/security/cve/CVE-2024-35976"
},
{
"category": "external",
"summary": "SUSE Bug 1224575 for CVE-2024-35976",
"url": "https://bugzilla.suse.com/1224575"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35976"
},
{
"cve": "CVE-2024-35979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35979"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nraid1: fix use-after-free for original bio in raid1_write_request()\n\nr1_bio-\u003ebios[] is used to record new bios that will be issued to\nunderlying disks, however, in raid1_write_request(), r1_bio-\u003ebios[]\nwill set to the original bio temporarily. Meanwhile, if blocked rdev\nis set, free_r1bio() will be called causing that all r1_bio-\u003ebios[]\nto be freed:\n\nraid1_write_request()\n r1_bio = alloc_r1bio(mddev, bio); -\u003e r1_bio-\u003ebios[] is NULL\n for (i = 0; i \u003c disks; i++) -\u003e for each rdev in conf\n // first rdev is normal\n r1_bio-\u003ebios[0] = bio; -\u003e set to original bio\n // second rdev is blocked\n if (test_bit(Blocked, \u0026rdev-\u003eflags))\n break\n\n if (blocked_rdev)\n free_r1bio()\n put_all_bios()\n bio_put(r1_bio-\u003ebios[0]) -\u003e original bio is freed\n\nTest scripts:\n\nmdadm -CR /dev/md0 -l1 -n4 /dev/sd[abcd] --assume-clean\nfio -filename=/dev/md0 -ioengine=libaio -rw=write -bs=4k -numjobs=1 \\\n -iodepth=128 -name=test -direct=1\necho blocked \u003e /sys/block/md0/md/rd2/state\n\nTest result:\n\nBUG bio-264 (Not tainted): Object already free\n-----------------------------------------------------------------------------\n\nAllocated in mempool_alloc_slab+0x24/0x50 age=1 cpu=1 pid=869\n kmem_cache_alloc+0x324/0x480\n mempool_alloc_slab+0x24/0x50\n mempool_alloc+0x6e/0x220\n bio_alloc_bioset+0x1af/0x4d0\n blkdev_direct_IO+0x164/0x8a0\n blkdev_write_iter+0x309/0x440\n aio_write+0x139/0x2f0\n io_submit_one+0x5ca/0xb70\n __do_sys_io_submit+0x86/0x270\n __x64_sys_io_submit+0x22/0x30\n do_syscall_64+0xb1/0x210\n entry_SYSCALL_64_after_hwframe+0x6c/0x74\nFreed in mempool_free_slab+0x1f/0x30 age=1 cpu=1 pid=869\n kmem_cache_free+0x28c/0x550\n mempool_free_slab+0x1f/0x30\n mempool_free+0x40/0x100\n bio_free+0x59/0x80\n bio_put+0xf0/0x220\n free_r1bio+0x74/0xb0\n raid1_make_request+0xadf/0x1150\n md_handle_request+0xc7/0x3b0\n md_submit_bio+0x76/0x130\n __submit_bio+0xd8/0x1d0\n submit_bio_noacct_nocheck+0x1eb/0x5c0\n submit_bio_noacct+0x169/0xd40\n submit_bio+0xee/0x1d0\n blkdev_direct_IO+0x322/0x8a0\n blkdev_write_iter+0x309/0x440\n aio_write+0x139/0x2f0\n\nSince that bios for underlying disks are not allocated yet, fix this\nproblem by using mempool_free() directly to free the r1_bio.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35979",
"url": "https://www.suse.com/security/cve/CVE-2024-35979"
},
{
"category": "external",
"summary": "SUSE Bug 1224572 for CVE-2024-35979",
"url": "https://bugzilla.suse.com/1224572"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35979"
},
{
"cve": "CVE-2024-35997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35997"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: i2c-hid: remove I2C_HID_READ_PENDING flag to prevent lock-up\n\nThe flag I2C_HID_READ_PENDING is used to serialize I2C operations.\nHowever, this is not necessary, because I2C core already has its own\nlocking for that.\n\nMore importantly, this flag can cause a lock-up: if the flag is set in\ni2c_hid_xfer() and an interrupt happens, the interrupt handler\n(i2c_hid_irq) will check this flag and return immediately without doing\nanything, then the interrupt handler will be invoked again in an\ninfinite loop.\n\nSince interrupt handler is an RT task, it takes over the CPU and the\nflag-clearing task never gets scheduled, thus we have a lock-up.\n\nDelete this unnecessary flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35997",
"url": "https://www.suse.com/security/cve/CVE-2024-35997"
},
{
"category": "external",
"summary": "SUSE Bug 1224552 for CVE-2024-35997",
"url": "https://bugzilla.suse.com/1224552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35997"
},
{
"cve": "CVE-2024-35998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-35998"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb3: fix lock ordering potential deadlock in cifs_sync_mid_result\n\nCoverity spotted that the cifs_sync_mid_result function could deadlock\n\n\"Thread deadlock (ORDER_REVERSAL) lock_order: Calling spin_lock acquires\nlock TCP_Server_Info.srv_lock while holding lock TCP_Server_Info.mid_lock\"\n\nAddresses-Coverity: 1590401 (\"Thread deadlock (ORDER_REVERSAL)\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-35998",
"url": "https://www.suse.com/security/cve/CVE-2024-35998"
},
{
"category": "external",
"summary": "SUSE Bug 1224549 for CVE-2024-35998",
"url": "https://bugzilla.suse.com/1224549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-35998"
},
{
"cve": "CVE-2024-36016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36016"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntty: n_gsm: fix possible out-of-bounds in gsm0_receive()\n\nAssuming the following:\n- side A configures the n_gsm in basic option mode\n- side B sends the header of a basic option mode frame with data length 1\n- side A switches to advanced option mode\n- side B sends 2 data bytes which exceeds gsm-\u003elen\n Reason: gsm-\u003elen is not used in advanced option mode.\n- side A switches to basic option mode\n- side B keeps sending until gsm0_receive() writes past gsm-\u003ebuf\n Reason: Neither gsm-\u003estate nor gsm-\u003elen have been reset after\n reconfiguration.\n\nFix this by changing gsm-\u003ecount to gsm-\u003elen comparison from equal to less\nthan. Also add upper limit checks against the constant MAX_MRU in\ngsm0_receive() and gsm1_receive() to harden against memory corruption of\ngsm-\u003elen and gsm-\u003emru.\n\nAll other checks remain as we still need to limit the data according to the\nuser configuration and actual payload size.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36016",
"url": "https://www.suse.com/security/cve/CVE-2024-36016"
},
{
"category": "external",
"summary": "SUSE Bug 1225642 for CVE-2024-36016",
"url": "https://bugzilla.suse.com/1225642"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36016"
},
{
"cve": "CVE-2024-36017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36017"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation\n\nEach attribute inside a nested IFLA_VF_VLAN_LIST is assumed to be a\nstruct ifla_vf_vlan_info so the size of such attribute needs to be at least\nof sizeof(struct ifla_vf_vlan_info) which is 14 bytes.\nThe current size validation in do_setvfinfo is against NLA_HDRLEN (4 bytes)\nwhich is less than sizeof(struct ifla_vf_vlan_info) so this validation\nis not enough and a too small attribute might be cast to a\nstruct ifla_vf_vlan_info, this might result in an out of bands\nread access when accessing the saved (casted) entry in ivvl.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36017",
"url": "https://www.suse.com/security/cve/CVE-2024-36017"
},
{
"category": "external",
"summary": "SUSE Bug 1225681 for CVE-2024-36017",
"url": "https://bugzilla.suse.com/1225681"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36017"
},
{
"cve": "CVE-2024-36025",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36025"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix off by one in qla_edif_app_getstats()\n\nThe app_reply-\u003eelem[] array is allocated earlier in this function and it\nhas app_req.num_ports elements. Thus this \u003e comparison needs to be \u003e= to\nprevent memory corruption.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36025",
"url": "https://www.suse.com/security/cve/CVE-2024-36025"
},
{
"category": "external",
"summary": "SUSE Bug 1225704 for CVE-2024-36025",
"url": "https://bugzilla.suse.com/1225704"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36025"
},
{
"cve": "CVE-2024-36479",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36479"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: bridge: add owner module and take its refcount\n\nThe current implementation of the fpga bridge assumes that the low-level\nmodule registers a driver for the parent device and uses its owner pointer\nto take the module\u0027s refcount. This approach is problematic since it can\nlead to a null pointer dereference while attempting to get the bridge if\nthe parent device does not have a driver.\n\nTo address this problem, add a module owner pointer to the fpga_bridge\nstruct and use it to take the module\u0027s refcount. Modify the function for\nregistering a bridge to take an additional owner module parameter and\nrename it to avoid conflicts. Use the old function name for a helper macro\nthat automatically sets the module that registers the bridge as the owner.\nThis ensures compatibility with existing low-level control modules and\nreduces the chances of registering a bridge without setting the owner.\n\nAlso, update the documentation to keep it consistent with the new interface\nfor registering an fpga bridge.\n\nOther changes: opportunistically move put_device() from __fpga_bridge_get()\nto fpga_bridge_get() and of_fpga_bridge_get() to improve code clarity since\nthe bridge device is taken in these functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36479",
"url": "https://www.suse.com/security/cve/CVE-2024-36479"
},
{
"category": "external",
"summary": "SUSE Bug 1226949 for CVE-2024-36479",
"url": "https://bugzilla.suse.com/1226949"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36479"
},
{
"cve": "CVE-2024-36592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36592"
}
],
"notes": [
{
"category": "general",
"text": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36592",
"url": "https://www.suse.com/security/cve/CVE-2024-36592"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2024-36592"
},
{
"cve": "CVE-2024-36880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36880"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: qca: add missing firmware sanity checks\n\nAdd the missing sanity checks when parsing the firmware files before\ndownloading them to avoid accessing and corrupting memory beyond the\nvmalloced buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36880",
"url": "https://www.suse.com/security/cve/CVE-2024-36880"
},
{
"category": "external",
"summary": "SUSE Bug 1225722 for CVE-2024-36880",
"url": "https://bugzilla.suse.com/1225722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36880"
},
{
"cve": "CVE-2024-36894",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36894"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: f_fs: Fix race between aio_cancel() and AIO request complete\n\nFFS based applications can utilize the aio_cancel() callback to dequeue\npending USB requests submitted to the UDC. There is a scenario where the\nFFS application issues an AIO cancel call, while the UDC is handling a\nsoft disconnect. For a DWC3 based implementation, the callstack looks\nlike the following:\n\n DWC3 Gadget FFS Application\ndwc3_gadget_soft_disconnect() ...\n --\u003e dwc3_stop_active_transfers()\n --\u003e dwc3_gadget_giveback(-ESHUTDOWN)\n --\u003e ffs_epfile_async_io_complete() ffs_aio_cancel()\n --\u003e usb_ep_free_request() --\u003e usb_ep_dequeue()\n\nThere is currently no locking implemented between the AIO completion\nhandler and AIO cancel, so the issue occurs if the completion routine is\nrunning in parallel to an AIO cancel call coming from the FFS application.\nAs the completion call frees the USB request (io_data-\u003ereq) the FFS\napplication is also referencing it for the usb_ep_dequeue() call. This can\nlead to accessing a stale/hanging pointer.\n\ncommit b566d38857fc (\"usb: gadget: f_fs: use io_data-\u003estatus consistently\")\nrelocated the usb_ep_free_request() into ffs_epfile_async_io_complete().\nHowever, in order to properly implement locking to mitigate this issue, the\nspinlock can\u0027t be added to ffs_epfile_async_io_complete(), as\nusb_ep_dequeue() (if successfully dequeuing a USB request) will call the\nfunction driver\u0027s completion handler in the same context. Hence, leading\ninto a deadlock.\n\nFix this issue by moving the usb_ep_free_request() back to\nffs_user_copy_worker(), and ensuring that it explicitly sets io_data-\u003ereq\nto NULL after freeing it within the ffs-\u003eeps_lock. This resolves the race\ncondition above, as the ffs_aio_cancel() routine will not continue\nattempting to dequeue a request that has already been freed, or the\nffs_user_copy_work() not freeing the USB request until the AIO cancel is\ndone referencing it.\n\nThis fix depends on\n commit b566d38857fc (\"usb: gadget: f_fs: use io_data-\u003estatus\n consistently\")",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36894",
"url": "https://www.suse.com/security/cve/CVE-2024-36894"
},
{
"category": "external",
"summary": "SUSE Bug 1225749 for CVE-2024-36894",
"url": "https://bugzilla.suse.com/1225749"
},
{
"category": "external",
"summary": "SUSE Bug 1226139 for CVE-2024-36894",
"url": "https://bugzilla.suse.com/1226139"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36894"
},
{
"cve": "CVE-2024-36915",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36915"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: llcp: fix nfc_llcp_setsockopt() unsafe copies\n\nsyzbot reported unsafe calls to copy_from_sockptr() [1]\n\nUse copy_safe_from_sockptr() instead.\n\n[1]\n\nBUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]\n BUG: KASAN: slab-out-of-bounds in nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255\nRead of size 4 at addr ffff88801caa1ec3 by task syz-executor459/5078\n\nCPU: 0 PID: 5078 Comm: syz-executor459 Not tainted 6.8.0-syzkaller-08951-gfe46a7dd189e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]\n copy_from_sockptr include/linux/sockptr.h:55 [inline]\n nfc_llcp_setsockopt+0x6c2/0x850 net/nfc/llcp_sock.c:255\n do_sock_setsockopt+0x3b1/0x720 net/socket.c:2311\n __sys_setsockopt+0x1ae/0x250 net/socket.c:2334\n __do_sys_setsockopt net/socket.c:2343 [inline]\n __se_sys_setsockopt net/socket.c:2340 [inline]\n __x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340\n do_syscall_64+0xfd/0x240\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\nRIP: 0033:0x7f7fac07fd89\nCode: 28 00 00 00 75 05 48 83 c4 28 c3 e8 91 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007fff660eb788 EFLAGS: 00000246 ORIG_RAX: 0000000000000036\nRAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7fac07fd89\nRDX: 0000000000000000 RSI: 0000000000000118 RDI: 0000000000000004\nRBP: 0000000000000000 R08: 0000000000000002 R09: 0000000000000000\nR10: 0000000020000a80 R11: 0000000000000246 R12: 0000000000000000\nR13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36915",
"url": "https://www.suse.com/security/cve/CVE-2024-36915"
},
{
"category": "external",
"summary": "SUSE Bug 1225758 for CVE-2024-36915",
"url": "https://bugzilla.suse.com/1225758"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36915"
},
{
"cve": "CVE-2024-36917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36917"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: fix overflow in blk_ioctl_discard()\n\nThere is no check for overflow of \u0027start + len\u0027 in blk_ioctl_discard().\nHung task occurs if submit an discard ioctl with the following param:\n start = 0x80000000000ff000, len = 0x8000000000fff000;\nAdd the overflow validation now.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36917",
"url": "https://www.suse.com/security/cve/CVE-2024-36917"
},
{
"category": "external",
"summary": "SUSE Bug 1225770 for CVE-2024-36917",
"url": "https://bugzilla.suse.com/1225770"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36917"
},
{
"cve": "CVE-2024-36919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36919"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: bnx2fc: Remove spin_lock_bh while releasing resources after upload\n\nThe session resources are used by FW and driver when session is offloaded,\nonce session is uploaded these resources are not used. The lock is not\nrequired as these fields won\u0027t be used any longer. The offload and upload\ncalls are sequential, hence lock is not required.\n\nThis will suppress following BUG_ON():\n\n[ 449.843143] ------------[ cut here ]------------\n[ 449.848302] kernel BUG at mm/vmalloc.c:2727!\n[ 449.853072] invalid opcode: 0000 [#1] PREEMPT SMP PTI\n[ 449.858712] CPU: 5 PID: 1996 Comm: kworker/u24:2 Not tainted 5.14.0-118.el9.x86_64 #1\nRebooting.\n[ 449.867454] Hardware name: Dell Inc. PowerEdge R730/0WCJNT, BIOS 2.3.4 11/08/2016\n[ 449.876966] Workqueue: fc_rport_eq fc_rport_work [libfc]\n[ 449.882910] RIP: 0010:vunmap+0x2e/0x30\n[ 449.887098] Code: 00 65 8b 05 14 a2 f0 4a a9 00 ff ff 00 75 1b 55 48 89 fd e8 34 36 79 00 48 85 ed 74 0b 48 89 ef 31 f6 5d e9 14 fc ff ff 5d c3 \u003c0f\u003e 0b 0f 1f 44 00 00 41 57 41 56 49 89 ce 41 55 49 89 fd 41 54 41\n[ 449.908054] RSP: 0018:ffffb83d878b3d68 EFLAGS: 00010206\n[ 449.913887] RAX: 0000000080000201 RBX: ffff8f4355133550 RCX: 000000000d400005\n[ 449.921843] RDX: 0000000000000001 RSI: 0000000000001000 RDI: ffffb83da53f5000\n[ 449.929808] RBP: ffff8f4ac6675800 R08: ffffb83d878b3d30 R09: 00000000000efbdf\n[ 449.937774] R10: 0000000000000003 R11: ffff8f434573e000 R12: 0000000000001000\n[ 449.945736] R13: 0000000000001000 R14: ffffb83da53f5000 R15: ffff8f43d4ea3ae0\n[ 449.953701] FS: 0000000000000000(0000) GS:ffff8f529fc80000(0000) knlGS:0000000000000000\n[ 449.962732] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 449.969138] CR2: 00007f8cf993e150 CR3: 0000000efbe10003 CR4: 00000000003706e0\n[ 449.977102] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 449.985065] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 449.993028] Call Trace:\n[ 449.995756] __iommu_dma_free+0x96/0x100\n[ 450.000139] bnx2fc_free_session_resc+0x67/0x240 [bnx2fc]\n[ 450.006171] bnx2fc_upload_session+0xce/0x100 [bnx2fc]\n[ 450.011910] bnx2fc_rport_event_handler+0x9f/0x240 [bnx2fc]\n[ 450.018136] fc_rport_work+0x103/0x5b0 [libfc]\n[ 450.023103] process_one_work+0x1e8/0x3c0\n[ 450.027581] worker_thread+0x50/0x3b0\n[ 450.031669] ? rescuer_thread+0x370/0x370\n[ 450.036143] kthread+0x149/0x170\n[ 450.039744] ? set_kthread_struct+0x40/0x40\n[ 450.044411] ret_from_fork+0x22/0x30\n[ 450.048404] Modules linked in: vfat msdos fat xfs nfs_layout_nfsv41_files rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver dm_service_time qedf qed crc8 bnx2fc libfcoe libfc scsi_transport_fc intel_rapl_msr intel_rapl_common x86_pkg_temp_thermal intel_powerclamp dcdbas rapl intel_cstate intel_uncore mei_me pcspkr mei ipmi_ssif lpc_ich ipmi_si fuse zram ext4 mbcache jbd2 loop nfsv3 nfs_acl nfs lockd grace fscache netfs irdma ice sd_mod t10_pi sg ib_uverbs ib_core 8021q garp mrp stp llc mgag200 i2c_algo_bit drm_kms_helper syscopyarea sysfillrect sysimgblt mxm_wmi fb_sys_fops cec crct10dif_pclmul ahci crc32_pclmul bnx2x drm ghash_clmulni_intel libahci rfkill i40e libata megaraid_sas mdio wmi sunrpc lrw dm_crypt dm_round_robin dm_multipath dm_snapshot dm_bufio dm_mirror dm_region_hash dm_log dm_zero dm_mod linear raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx raid6_pq libcrc32c crc32c_intel raid1 raid0 iscsi_ibft squashfs be2iscsi bnx2i cnic uio cxgb4i cxgb4 tls\n[ 450.048497] libcxgbi libcxgb qla4xxx iscsi_boot_sysfs iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi edd ipmi_devintf ipmi_msghandler\n[ 450.159753] ---[ end trace 712de2c57c64abc8 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36919",
"url": "https://www.suse.com/security/cve/CVE-2024-36919"
},
{
"category": "external",
"summary": "SUSE Bug 1225767 for CVE-2024-36919",
"url": "https://bugzilla.suse.com/1225767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36919"
},
{
"cve": "CVE-2024-36923",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36923"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: fix uninitialized values during inode evict\n\nIf an iget fails due to not being able to retrieve information\nfrom the server then the inode structure is only partially\ninitialized. When the inode gets evicted, references to\nuninitialized structures (like fscache cookies) were being\nmade.\n\nThis patch checks for a bad_inode before doing anything other\nthan clearing the inode from the cache. Since the inode is\nbad, it shouldn\u0027t have any state associated with it that needs\nto be written back (and there really isn\u0027t a way to complete\nthose anyways).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36923",
"url": "https://www.suse.com/security/cve/CVE-2024-36923"
},
{
"category": "external",
"summary": "SUSE Bug 1225815 for CVE-2024-36923",
"url": "https://bugzilla.suse.com/1225815"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36923"
},
{
"cve": "CVE-2024-36934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36934"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbna: ensure the copied buf is NUL terminated\n\nCurrently, we allocate a nbytes-sized kernel buffer and copy nbytes from\nuserspace to that buffer. Later, we use sscanf on this buffer but we don\u0027t\nensure that the string is terminated inside the buffer, this can lead to\nOOB read when using sscanf. Fix this issue by using memdup_user_nul\ninstead of memdup_user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36934",
"url": "https://www.suse.com/security/cve/CVE-2024-36934"
},
{
"category": "external",
"summary": "SUSE Bug 1225760 for CVE-2024-36934",
"url": "https://bugzilla.suse.com/1225760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36934"
},
{
"cve": "CVE-2024-36938",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36938"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, skmsg: Fix NULL pointer dereference in sk_psock_skb_ingress_enqueue\n\nFix NULL pointer data-races in sk_psock_skb_ingress_enqueue() which\nsyzbot reported [1].\n\n[1]\nBUG: KCSAN: data-race in sk_psock_drop / sk_psock_skb_ingress_enqueue\n\nwrite to 0xffff88814b3278b8 of 8 bytes by task 10724 on cpu 1:\n sk_psock_stop_verdict net/core/skmsg.c:1257 [inline]\n sk_psock_drop+0x13e/0x1f0 net/core/skmsg.c:843\n sk_psock_put include/linux/skmsg.h:459 [inline]\n sock_map_close+0x1a7/0x260 net/core/sock_map.c:1648\n unix_release+0x4b/0x80 net/unix/af_unix.c:1048\n __sock_release net/socket.c:659 [inline]\n sock_close+0x68/0x150 net/socket.c:1421\n __fput+0x2c1/0x660 fs/file_table.c:422\n __fput_sync+0x44/0x60 fs/file_table.c:507\n __do_sys_close fs/open.c:1556 [inline]\n __se_sys_close+0x101/0x1b0 fs/open.c:1541\n __x64_sys_close+0x1f/0x30 fs/open.c:1541\n do_syscall_64+0xd3/0x1d0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nread to 0xffff88814b3278b8 of 8 bytes by task 10713 on cpu 0:\n sk_psock_data_ready include/linux/skmsg.h:464 [inline]\n sk_psock_skb_ingress_enqueue+0x32d/0x390 net/core/skmsg.c:555\n sk_psock_skb_ingress_self+0x185/0x1e0 net/core/skmsg.c:606\n sk_psock_verdict_apply net/core/skmsg.c:1008 [inline]\n sk_psock_verdict_recv+0x3e4/0x4a0 net/core/skmsg.c:1202\n unix_read_skb net/unix/af_unix.c:2546 [inline]\n unix_stream_read_skb+0x9e/0xf0 net/unix/af_unix.c:2682\n sk_psock_verdict_data_ready+0x77/0x220 net/core/skmsg.c:1223\n unix_stream_sendmsg+0x527/0x860 net/unix/af_unix.c:2339\n sock_sendmsg_nosec net/socket.c:730 [inline]\n __sock_sendmsg+0x140/0x180 net/socket.c:745\n ____sys_sendmsg+0x312/0x410 net/socket.c:2584\n ___sys_sendmsg net/socket.c:2638 [inline]\n __sys_sendmsg+0x1e9/0x280 net/socket.c:2667\n __do_sys_sendmsg net/socket.c:2676 [inline]\n __se_sys_sendmsg net/socket.c:2674 [inline]\n __x64_sys_sendmsg+0x46/0x50 net/socket.c:2674\n do_syscall_64+0xd3/0x1d0\n entry_SYSCALL_64_after_hwframe+0x6d/0x75\n\nvalue changed: 0xffffffff83d7feb0 -\u003e 0x0000000000000000\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 0 PID: 10713 Comm: syz-executor.4 Tainted: G W 6.8.0-syzkaller-08951-gfe46a7dd189e #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024\n\nPrior to this, commit 4cd12c6065df (\"bpf, sockmap: Fix NULL pointer\ndereference in sk_psock_verdict_data_ready()\") fixed one NULL pointer\nsimilarly due to no protection of saved_data_ready. Here is another\ndifferent caller causing the same issue because of the same reason. So\nwe should protect it with sk_callback_lock read lock because the writer\nside in the sk_psock_drop() uses \"write_lock_bh(\u0026sk-\u003esk_callback_lock);\".\n\nTo avoid errors that could happen in future, I move those two pairs of\nlock into the sk_psock_data_ready(), which is suggested by John Fastabend.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36938",
"url": "https://www.suse.com/security/cve/CVE-2024-36938"
},
{
"category": "external",
"summary": "SUSE Bug 1225761 for CVE-2024-36938",
"url": "https://bugzilla.suse.com/1225761"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36938"
},
{
"cve": "CVE-2024-36940",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36940"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: core: delete incorrect free in pinctrl_enable()\n\nThe \"pctldev\" struct is allocated in devm_pinctrl_register_and_init().\nIt\u0027s a devm_ managed pointer that is freed by devm_pinctrl_dev_release(),\nso freeing it in pinctrl_enable() will lead to a double free.\n\nThe devm_pinctrl_dev_release() function frees the pindescs and destroys\nthe mutex as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36940",
"url": "https://www.suse.com/security/cve/CVE-2024-36940"
},
{
"category": "external",
"summary": "SUSE Bug 1225840 for CVE-2024-36940",
"url": "https://bugzilla.suse.com/1225840"
},
{
"category": "external",
"summary": "SUSE Bug 1225841 for CVE-2024-36940",
"url": "https://bugzilla.suse.com/1225841"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36949",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36949"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\namd/amdkfd: sync all devices to wait all processes being evicted\n\nIf there are more than one device doing reset in parallel, the first\ndevice will call kfd_suspend_all_processes() to evict all processes\non all devices, this call takes time to finish. other device will\nstart reset and recover without waiting. if the process has not been\nevicted before doing recover, it will be restored, then caused page\nfault.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36949",
"url": "https://www.suse.com/security/cve/CVE-2024-36949"
},
{
"category": "external",
"summary": "SUSE Bug 1225894 for CVE-2024-36949",
"url": "https://bugzilla.suse.com/1225894"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36949"
},
{
"cve": "CVE-2024-36950",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36950"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirewire: ohci: mask bus reset interrupts between ISR and bottom half\n\nIn the FireWire OHCI interrupt handler, if a bus reset interrupt has\noccurred, mask bus reset interrupts until bus_reset_work has serviced and\ncleared the interrupt.\n\nNormally, we always leave bus reset interrupts masked. We infer the bus\nreset from the self-ID interrupt that happens shortly thereafter. A\nscenario where we unmask bus reset interrupts was introduced in 2008 in\na007bb857e0b26f5d8b73c2ff90782d9c0972620: If\nOHCI_PARAM_DEBUG_BUSRESETS (8) is set in the debug parameter bitmask, we\nwill unmask bus reset interrupts so we can log them.\n\nirq_handler logs the bus reset interrupt. However, we can\u0027t clear the bus\nreset event flag in irq_handler, because we won\u0027t service the event until\nlater. irq_handler exits with the event flag still set. If the\ncorresponding interrupt is still unmasked, the first bus reset will\nusually freeze the system due to irq_handler being called again each\ntime it exits. This freeze can be reproduced by loading firewire_ohci\nwith \"modprobe firewire_ohci debug=-1\" (to enable all debugging output).\nApparently there are also some cases where bus_reset_work will get called\nsoon enough to clear the event, and operation will continue normally.\n\nThis freeze was first reported a few months after a007bb85 was committed,\nbut until now it was never fixed. The debug level could safely be set\nto -1 through sysfs after the module was loaded, but this would be\nineffectual in logging bus reset interrupts since they were only\nunmasked during initialization.\n\nirq_handler will now leave the event flag set but mask bus reset\ninterrupts, so irq_handler won\u0027t be called again and there will be no\nfreeze. If OHCI_PARAM_DEBUG_BUSRESETS is enabled, bus_reset_work will\nunmask the interrupt after servicing the event, so future interrupts\nwill be caught as desired.\n\nAs a side effect to this change, OHCI_PARAM_DEBUG_BUSRESETS can now be\nenabled through sysfs in addition to during initial module loading.\nHowever, when enabled through sysfs, logging of bus reset interrupts will\nbe effective only starting with the second bus reset, after\nbus_reset_work has executed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36950",
"url": "https://www.suse.com/security/cve/CVE-2024-36950"
},
{
"category": "external",
"summary": "SUSE Bug 1225895 for CVE-2024-36950",
"url": "https://bugzilla.suse.com/1225895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36950"
},
{
"cve": "CVE-2024-36960",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36960"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix invalid reads in fence signaled events\n\nCorrectly set the length of the drm_event to the size of the structure\nthat\u0027s actually used.\n\nThe length of the drm_event was set to the parent structure instead of\nto the drm_vmw_event_fence which is supposed to be read. drm_read\nuses the length parameter to copy the event to the user space thus\nresuling in oob reads.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36960",
"url": "https://www.suse.com/security/cve/CVE-2024-36960"
},
{
"category": "external",
"summary": "SUSE Bug 1225872 for CVE-2024-36960",
"url": "https://bugzilla.suse.com/1225872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-36960"
},
{
"cve": "CVE-2024-36964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-36964"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/9p: only translate RWX permissions for plain 9P2000\n\nGarbage in plain 9P2000\u0027s perm bits is allowed through, which causes it\nto be able to set (among others) the suid bit. This was presumably not\nthe intent since the unix extended bits are handled explicitly and\nconditionally on .u.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-36964",
"url": "https://www.suse.com/security/cve/CVE-2024-36964"
},
{
"category": "external",
"summary": "SUSE Bug 1225866 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1225866"
},
{
"category": "external",
"summary": "SUSE Bug 1226325 for CVE-2024-36964",
"url": "https://bugzilla.suse.com/1226325"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "important"
}
],
"title": "CVE-2024-36964"
},
{
"cve": "CVE-2024-37021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37021"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfpga: manager: add owner module and take its refcount\n\nThe current implementation of the fpga manager assumes that the low-level\nmodule registers a driver for the parent device and uses its owner pointer\nto take the module\u0027s refcount. This approach is problematic since it can\nlead to a null pointer dereference while attempting to get the manager if\nthe parent device does not have a driver.\n\nTo address this problem, add a module owner pointer to the fpga_manager\nstruct and use it to take the module\u0027s refcount. Modify the functions for\nregistering the manager to take an additional owner module parameter and\nrename them to avoid conflicts. Use the old function names for helper\nmacros that automatically set the module that registers the manager as the\nowner. This ensures compatibility with existing low-level control modules\nand reduces the chances of registering a manager without setting the owner.\n\nAlso, update the documentation to keep it consistent with the new interface\nfor registering an fpga manager.\n\nOther changes: opportunistically move put_device() from __fpga_mgr_get() to\nfpga_mgr_get() and of_fpga_mgr_get() to improve code clarity since the\nmanager device is taken in these functions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37021",
"url": "https://www.suse.com/security/cve/CVE-2024-37021"
},
{
"category": "external",
"summary": "SUSE Bug 1226950 for CVE-2024-37021",
"url": "https://bugzilla.suse.com/1226950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-37021"
},
{
"cve": "CVE-2024-37354",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-37354"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix crash on racing fsync and size-extending write into prealloc\n\nWe have been seeing crashes on duplicate keys in\nbtrfs_set_item_key_safe():\n\n BTRFS critical (device vdb): slot 4 key (450 108 8192) new key (450 108 8192)\n ------------[ cut here ]------------\n kernel BUG at fs/btrfs/ctree.c:2620!\n invalid opcode: 0000 [#1] PREEMPT SMP PTI\n CPU: 0 PID: 3139 Comm: xfs_io Kdump: loaded Not tainted 6.9.0 #6\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-2.fc40 04/01/2014\n RIP: 0010:btrfs_set_item_key_safe+0x11f/0x290 [btrfs]\n\nWith the following stack trace:\n\n #0 btrfs_set_item_key_safe (fs/btrfs/ctree.c:2620:4)\n #1 btrfs_drop_extents (fs/btrfs/file.c:411:4)\n #2 log_one_extent (fs/btrfs/tree-log.c:4732:9)\n #3 btrfs_log_changed_extents (fs/btrfs/tree-log.c:4955:9)\n #4 btrfs_log_inode (fs/btrfs/tree-log.c:6626:9)\n #5 btrfs_log_inode_parent (fs/btrfs/tree-log.c:7070:8)\n #6 btrfs_log_dentry_safe (fs/btrfs/tree-log.c:7171:8)\n #7 btrfs_sync_file (fs/btrfs/file.c:1933:8)\n #8 vfs_fsync_range (fs/sync.c:188:9)\n #9 vfs_fsync (fs/sync.c:202:9)\n #10 do_fsync (fs/sync.c:212:9)\n #11 __do_sys_fdatasync (fs/sync.c:225:9)\n #12 __se_sys_fdatasync (fs/sync.c:223:1)\n #13 __x64_sys_fdatasync (fs/sync.c:223:1)\n #14 do_syscall_x64 (arch/x86/entry/common.c:52:14)\n #15 do_syscall_64 (arch/x86/entry/common.c:83:7)\n #16 entry_SYSCALL_64+0xaf/0x14c (arch/x86/entry/entry_64.S:121)\n\nSo we\u0027re logging a changed extent from fsync, which is splitting an\nextent in the log tree. But this split part already exists in the tree,\ntriggering the BUG().\n\nThis is the state of the log tree at the time of the crash, dumped with\ndrgn (https://github.com/osandov/drgn/blob/main/contrib/btrfs_tree.py)\nto get more details than btrfs_print_leaf() gives us:\n\n \u003e\u003e\u003e print_extent_buffer(prog.crashed_thread().stack_trace()[0][\"eb\"])\n leaf 33439744 level 0 items 72 generation 9 owner 18446744073709551610\n leaf 33439744 flags 0x100000000000000\n fs uuid e5bd3946-400c-4223-8923-190ef1f18677\n chunk uuid d58cb17e-6d02-494a-829a-18b7d8a399da\n item 0 key (450 INODE_ITEM 0) itemoff 16123 itemsize 160\n generation 7 transid 9 size 8192 nbytes 8473563889606862198\n block group 0 mode 100600 links 1 uid 0 gid 0 rdev 0\n sequence 204 flags 0x10(PREALLOC)\n atime 1716417703.220000000 (2024-05-22 15:41:43)\n ctime 1716417704.983333333 (2024-05-22 15:41:44)\n mtime 1716417704.983333333 (2024-05-22 15:41:44)\n otime 17592186044416.000000000 (559444-03-08 01:40:16)\n item 1 key (450 INODE_REF 256) itemoff 16110 itemsize 13\n index 195 namelen 3 name: 193\n item 2 key (450 XATTR_ITEM 1640047104) itemoff 16073 itemsize 37\n location key (0 UNKNOWN.0 0) type XATTR\n transid 7 data_len 1 name_len 6\n name: user.a\n data a\n item 3 key (450 EXTENT_DATA 0) itemoff 16020 itemsize 53\n generation 9 type 1 (regular)\n extent data disk byte 303144960 nr 12288\n extent data offset 0 nr 4096 ram 12288\n extent compression 0 (none)\n item 4 key (450 EXTENT_DATA 4096) itemoff 15967 itemsize 53\n generation 9 type 2 (prealloc)\n prealloc data disk byte 303144960 nr 12288\n prealloc data offset 4096 nr 8192\n item 5 key (450 EXTENT_DATA 8192) itemoff 15914 itemsize 53\n generation 9 type 2 (prealloc)\n prealloc data disk byte 303144960 nr 12288\n prealloc data offset 8192 nr 4096\n ...\n\nSo the real problem happened earlier: notice that items 4 (4k-12k) and 5\n(8k-12k) overlap. Both are prealloc extents. Item 4 straddles i_size and\nitem 5 starts at i_size.\n\nHere is the state of \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-37354",
"url": "https://www.suse.com/security/cve/CVE-2024-37354"
},
{
"category": "external",
"summary": "SUSE Bug 1227101 for CVE-2024-37354",
"url": "https://bugzilla.suse.com/1227101"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-37354"
},
{
"cve": "CVE-2024-38544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38544"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Fix seg fault in rxe_comp_queue_pkt\n\nIn rxe_comp_queue_pkt() an incoming response packet skb is enqueued to the\nresp_pkts queue and then a decision is made whether to run the completer\ntask inline or schedule it. Finally the skb is dereferenced to bump a \u0027hw\u0027\nperformance counter. This is wrong because if the completer task is\nalready running in a separate thread it may have already processed the skb\nand freed it which can cause a seg fault. This has been observed\ninfrequently in testing at high scale.\n\nThis patch fixes this by changing the order of enqueuing the packet until\nafter the counter is accessed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38544",
"url": "https://www.suse.com/security/cve/CVE-2024-38544"
},
{
"category": "external",
"summary": "SUSE Bug 1226597 for CVE-2024-38544",
"url": "https://bugzilla.suse.com/1226597"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38544"
},
{
"cve": "CVE-2024-38545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38545"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix UAF for cq async event\n\nThe refcount of CQ is not protected by locks. When CQ asynchronous\nevents and CQ destruction are concurrent, CQ may have been released,\nwhich will cause UAF.\n\nUse the xa_lock() to protect the CQ refcount.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38545",
"url": "https://www.suse.com/security/cve/CVE-2024-38545"
},
{
"category": "external",
"summary": "SUSE Bug 1226595 for CVE-2024-38545",
"url": "https://bugzilla.suse.com/1226595"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38545"
},
{
"cve": "CVE-2024-38546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38546"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm: vc4: Fix possible null pointer dereference\n\nIn vc4_hdmi_audio_init() of_get_address() may return\nNULL which is later dereferenced. Fix this bug by adding NULL check.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38546",
"url": "https://www.suse.com/security/cve/CVE-2024-38546"
},
{
"category": "external",
"summary": "SUSE Bug 1226593 for CVE-2024-38546",
"url": "https://bugzilla.suse.com/1226593"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38546"
},
{
"cve": "CVE-2024-38549",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38549"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/mediatek: Add 0 size check to mtk_drm_gem_obj\n\nAdd a check to mtk_drm_gem_init if we attempt to allocate a GEM object\nof 0 bytes. Currently, no such check exists and the kernel will panic if\na userspace application attempts to allocate a 0x0 GBM buffer.\n\nTested by attempting to allocate a 0x0 GBM buffer on an MT8188 and\nverifying that we now return EINVAL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38549",
"url": "https://www.suse.com/security/cve/CVE-2024-38549"
},
{
"category": "external",
"summary": "SUSE Bug 1226735 for CVE-2024-38549",
"url": "https://bugzilla.suse.com/1226735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38549"
},
{
"cve": "CVE-2024-38552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38552"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/display: Fix potential index out of bounds in color transformation function\n\nFixes index out of bounds issue in the color transformation function.\nThe issue could occur when the index \u0027i\u0027 exceeds the number of transfer\nfunction points (TRANSFER_FUNC_POINTS).\n\nThe fix adds a check to ensure \u0027i\u0027 is within bounds before accessing the\ntransfer function points. If \u0027i\u0027 is out of bounds, an error message is\nlogged and the function returns false to indicate an error.\n\nReported by smatch:\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:405 cm_helper_translate_curve_to_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.red\u0027 1025 \u003c= s32max\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:406 cm_helper_translate_curve_to_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.green\u0027 1025 \u003c= s32max\ndrivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:407 cm_helper_translate_curve_to_hw_format() error: buffer overflow \u0027output_tf-\u003etf_pts.blue\u0027 1025 \u003c= s32max",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38552",
"url": "https://www.suse.com/security/cve/CVE-2024-38552"
},
{
"category": "external",
"summary": "SUSE Bug 1226767 for CVE-2024-38552",
"url": "https://bugzilla.suse.com/1226767"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38552"
},
{
"cve": "CVE-2024-38553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38553"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fec: remove .ndo_poll_controller to avoid deadlocks\n\nThere is a deadlock issue found in sungem driver, please refer to the\ncommit ac0a230f719b (\"eth: sungem: remove .ndo_poll_controller to avoid\ndeadlocks\"). The root cause of the issue is that netpoll is in atomic\ncontext and disable_irq() is called by .ndo_poll_controller interface\nof sungem driver, however, disable_irq() might sleep. After analyzing\nthe implementation of fec_poll_controller(), the fec driver should have\nthe same issue. Due to the fec driver uses NAPI for TX completions, the\n.ndo_poll_controller is unnecessary to be implemented in the fec driver,\nso fec_poll_controller() can be safely removed.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38553",
"url": "https://www.suse.com/security/cve/CVE-2024-38553"
},
{
"category": "external",
"summary": "SUSE Bug 1226744 for CVE-2024-38553",
"url": "https://bugzilla.suse.com/1226744"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38553"
},
{
"cve": "CVE-2024-38565",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38565"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ar5523: enable proper endpoint verification\n\nSyzkaller reports [1] hitting a warning about an endpoint in use\nnot having an expected type to it.\n\nFix the issue by checking for the existence of all proper\nendpoints with their according types intact.\n\nSadly, this patch has not been tested on real hardware.\n\n[1] Syzkaller report:\n------------[ cut here ]------------\nusb 1-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 0 PID: 3643 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\n...\nCall Trace:\n \u003cTASK\u003e\n ar5523_cmd+0x41b/0x780 drivers/net/wireless/ath/ar5523/ar5523.c:275\n ar5523_cmd_read drivers/net/wireless/ath/ar5523/ar5523.c:302 [inline]\n ar5523_host_available drivers/net/wireless/ath/ar5523/ar5523.c:1376 [inline]\n ar5523_probe+0x14b0/0x1d10 drivers/net/wireless/ath/ar5523/ar5523.c:1655\n usb_probe_interface+0x30f/0x7f0 drivers/usb/core/driver.c:396\n call_driver_probe drivers/base/dd.c:560 [inline]\n really_probe+0x249/0xb90 drivers/base/dd.c:639\n __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808\n __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936\n bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427\n __device_attach+0x1e4/0x530 drivers/base/dd.c:1008\n bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487\n device_add+0xbd9/0x1e90 drivers/base/core.c:3517\n usb_set_configuration+0x101d/0x1900 drivers/usb/core/message.c:2170\n usb_generic_driver_probe+0xbe/0x100 drivers/usb/core/generic.c:238\n usb_probe_device+0xd8/0x2c0 drivers/usb/core/driver.c:293\n call_driver_probe drivers/base/dd.c:560 [inline]\n really_probe+0x249/0xb90 drivers/base/dd.c:639\n __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778\n driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808\n __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936\n bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427\n __device_attach+0x1e4/0x530 drivers/base/dd.c:1008\n bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487\n device_add+0xbd9/0x1e90 drivers/base/core.c:3517\n usb_new_device.cold+0x685/0x10ad drivers/usb/core/hub.c:2573\n hub_port_connect drivers/usb/core/hub.c:5353 [inline]\n hub_port_connect_change drivers/usb/core/hub.c:5497 [inline]\n port_event drivers/usb/core/hub.c:5653 [inline]\n hub_event+0x26cb/0x45d0 drivers/usb/core/hub.c:5735\n process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\n worker_thread+0x669/0x1090 kernel/workqueue.c:2436\n kthread+0x2e8/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306\n \u003c/TASK\u003e",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38565",
"url": "https://www.suse.com/security/cve/CVE-2024-38565"
},
{
"category": "external",
"summary": "SUSE Bug 1226747 for CVE-2024-38565",
"url": "https://bugzilla.suse.com/1226747"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38565"
},
{
"cve": "CVE-2024-38567",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38567"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: carl9170: add a proper sanity check for endpoints\n\nSyzkaller reports [1] hitting a warning which is caused by presence\nof a wrong endpoint type at the URB sumbitting stage. While there\nwas a check for a specific 4th endpoint, since it can switch types\nbetween bulk and interrupt, other endpoints are trusted implicitly.\nSimilar warning is triggered in a couple of other syzbot issues [2].\n\nFix the issue by doing a comprehensive check of all endpoints\ntaking into account difference between high- and full-speed\nconfiguration.\n\n[1] Syzkaller report:\n...\nWARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504\n...\nCall Trace:\n \u003cTASK\u003e\n carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504\n carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]\n carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]\n carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028\n request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107\n process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289\n worker_thread+0x669/0x1090 kernel/workqueue.c:2436\n kthread+0x2e8/0x3a0 kernel/kthread.c:376\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308\n \u003c/TASK\u003e\n\n[2] Related syzkaller crashes:",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38567",
"url": "https://www.suse.com/security/cve/CVE-2024-38567"
},
{
"category": "external",
"summary": "SUSE Bug 1226769 for CVE-2024-38567",
"url": "https://bugzilla.suse.com/1226769"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38567"
},
{
"cve": "CVE-2024-38578",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38578"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\necryptfs: Fix buffer size for tag 66 packet\n\nThe \u0027TAG 66 Packet Format\u0027 description is missing the cipher code and\nchecksum fields that are packed into the message packet. As a result,\nthe buffer allocated for the packet is 3 bytes too small and\nwrite_tag_66_packet() will write up to 3 bytes past the end of the\nbuffer.\n\nFix this by increasing the size of the allocation so the whole packet\nwill always fit in the buffer.\n\nThis fixes the below kasan slab-out-of-bounds bug:\n\n BUG: KASAN: slab-out-of-bounds in ecryptfs_generate_key_packet_set+0x7d6/0xde0\n Write of size 1 at addr ffff88800afbb2a5 by task touch/181\n\n CPU: 0 PID: 181 Comm: touch Not tainted 6.6.13-gnu #1 4c9534092be820851bb687b82d1f92a426598dc6\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2/GNU Guix 04/01/2014\n Call Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x4c/0x70\n print_report+0xc5/0x610\n ? ecryptfs_generate_key_packet_set+0x7d6/0xde0\n ? kasan_complete_mode_report_info+0x44/0x210\n ? ecryptfs_generate_key_packet_set+0x7d6/0xde0\n kasan_report+0xc2/0x110\n ? ecryptfs_generate_key_packet_set+0x7d6/0xde0\n __asan_store1+0x62/0x80\n ecryptfs_generate_key_packet_set+0x7d6/0xde0\n ? __pfx_ecryptfs_generate_key_packet_set+0x10/0x10\n ? __alloc_pages+0x2e2/0x540\n ? __pfx_ovl_open+0x10/0x10 [overlay 30837f11141636a8e1793533a02e6e2e885dad1d]\n ? dentry_open+0x8f/0xd0\n ecryptfs_write_metadata+0x30a/0x550\n ? __pfx_ecryptfs_write_metadata+0x10/0x10\n ? ecryptfs_get_lower_file+0x6b/0x190\n ecryptfs_initialize_file+0x77/0x150\n ecryptfs_create+0x1c2/0x2f0\n path_openat+0x17cf/0x1ba0\n ? __pfx_path_openat+0x10/0x10\n do_filp_open+0x15e/0x290\n ? __pfx_do_filp_open+0x10/0x10\n ? __kasan_check_write+0x18/0x30\n ? _raw_spin_lock+0x86/0xf0\n ? __pfx__raw_spin_lock+0x10/0x10\n ? __kasan_check_write+0x18/0x30\n ? alloc_fd+0xf4/0x330\n do_sys_openat2+0x122/0x160\n ? __pfx_do_sys_openat2+0x10/0x10\n __x64_sys_openat+0xef/0x170\n ? __pfx___x64_sys_openat+0x10/0x10\n do_syscall_64+0x60/0xd0\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n RIP: 0033:0x7f00a703fd67\n Code: 25 00 00 41 00 3d 00 00 41 00 74 37 64 8b 04 25 18 00 00 00 85 c0 75 5b 44 89 e2 48 89 ee bf 9c ff ff ff b8 01 01 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 0f 87 85 00 00 00 48 83 c4 68 5d 41 5c c3 0f 1f\n RSP: 002b:00007ffc088e30b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000101\n RAX: ffffffffffffffda RBX: 00007ffc088e3368 RCX: 00007f00a703fd67\n RDX: 0000000000000941 RSI: 00007ffc088e48d7 RDI: 00000000ffffff9c\n RBP: 00007ffc088e48d7 R08: 0000000000000001 R09: 0000000000000000\n R10: 00000000000001b6 R11: 0000000000000246 R12: 0000000000000941\n R13: 0000000000000000 R14: 00007ffc088e48d7 R15: 00007f00a7180040\n \u003c/TASK\u003e\n\n Allocated by task 181:\n kasan_save_stack+0x2f/0x60\n kasan_set_track+0x29/0x40\n kasan_save_alloc_info+0x25/0x40\n __kasan_kmalloc+0xc5/0xd0\n __kmalloc+0x66/0x160\n ecryptfs_generate_key_packet_set+0x6d2/0xde0\n ecryptfs_write_metadata+0x30a/0x550\n ecryptfs_initialize_file+0x77/0x150\n ecryptfs_create+0x1c2/0x2f0\n path_openat+0x17cf/0x1ba0\n do_filp_open+0x15e/0x290\n do_sys_openat2+0x122/0x160\n __x64_sys_openat+0xef/0x170\n do_syscall_64+0x60/0xd0\n entry_SYSCALL_64_after_hwframe+0x6e/0xd8",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38578",
"url": "https://www.suse.com/security/cve/CVE-2024-38578"
},
{
"category": "external",
"summary": "SUSE Bug 1226634 for CVE-2024-38578",
"url": "https://bugzilla.suse.com/1226634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38578"
},
{
"cve": "CVE-2024-38579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38579"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: bcm - Fix pointer arithmetic\n\nIn spu2_dump_omd() value of ptr is increased by ciph_key_len\ninstead of hash_iv_len which could lead to going beyond the\nbuffer boundaries.\nFix this bug by changing ciph_key_len to hash_iv_len.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38579",
"url": "https://www.suse.com/security/cve/CVE-2024-38579"
},
{
"category": "external",
"summary": "SUSE Bug 1226637 for CVE-2024-38579",
"url": "https://bugzilla.suse.com/1226637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38579"
},
{
"cve": "CVE-2024-38580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38580"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nepoll: be better about file lifetimes\n\nepoll can call out to vfs_poll() with a file pointer that may race with\nthe last \u0027fput()\u0027. That would make f_count go down to zero, and while\nthe ep-\u003emtx locking means that the resulting file pointer tear-down will\nbe blocked until the poll returns, it means that f_count is already\ndead, and any use of it won\u0027t actually get a reference to the file any\nmore: it\u0027s dead regardless.\n\nMake sure we have a valid ref on the file pointer before we call down to\nvfs_poll() from the epoll routines.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38580",
"url": "https://www.suse.com/security/cve/CVE-2024-38580"
},
{
"category": "external",
"summary": "SUSE Bug 1226610 for CVE-2024-38580",
"url": "https://bugzilla.suse.com/1226610"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38580"
},
{
"cve": "CVE-2024-38597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38597"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\neth: sungem: remove .ndo_poll_controller to avoid deadlocks\n\nErhard reports netpoll warnings from sungem:\n\n netpoll_send_skb_on_dev(): eth0 enabled interrupts in poll (gem_start_xmit+0x0/0x398)\n WARNING: CPU: 1 PID: 1 at net/core/netpoll.c:370 netpoll_send_skb+0x1fc/0x20c\n\ngem_poll_controller() disables interrupts, which may sleep.\nWe can\u0027t sleep in netpoll, it has interrupts disabled completely.\nStrangely, gem_poll_controller() doesn\u0027t even poll the completions,\nand instead acts as if an interrupt has fired so it just schedules\nNAPI and exits. None of this has been necessary for years, since\nnetpoll invokes NAPI directly.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38597",
"url": "https://www.suse.com/security/cve/CVE-2024-38597"
},
{
"category": "external",
"summary": "SUSE Bug 1226749 for CVE-2024-38597",
"url": "https://bugzilla.suse.com/1226749"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38597"
},
{
"cve": "CVE-2024-38601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38601"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nring-buffer: Fix a race between readers and resize checks\n\nThe reader code in rb_get_reader_page() swaps a new reader page into the\nring buffer by doing cmpxchg on old-\u003elist.prev-\u003enext to point it to the\nnew page. Following that, if the operation is successful,\nold-\u003elist.next-\u003eprev gets updated too. This means the underlying\ndoubly-linked list is temporarily inconsistent, page-\u003eprev-\u003enext or\npage-\u003enext-\u003eprev might not be equal back to page for some page in the\nring buffer.\n\nThe resize operation in ring_buffer_resize() can be invoked in parallel.\nIt calls rb_check_pages() which can detect the described inconsistency\nand stop further tracing:\n\n[ 190.271762] ------------[ cut here ]------------\n[ 190.271771] WARNING: CPU: 1 PID: 6186 at kernel/trace/ring_buffer.c:1467 rb_check_pages.isra.0+0x6a/0xa0\n[ 190.271789] Modules linked in: [...]\n[ 190.271991] Unloaded tainted modules: intel_uncore_frequency(E):1 skx_edac(E):1\n[ 190.272002] CPU: 1 PID: 6186 Comm: cmd.sh Kdump: loaded Tainted: G E 6.9.0-rc6-default #5 158d3e1e6d0b091c34c3b96bfd99a1c58306d79f\n[ 190.272011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552c-rebuilt.opensuse.org 04/01/2014\n[ 190.272015] RIP: 0010:rb_check_pages.isra.0+0x6a/0xa0\n[ 190.272023] Code: [...]\n[ 190.272028] RSP: 0018:ffff9c37463abb70 EFLAGS: 00010206\n[ 190.272034] RAX: ffff8eba04b6cb80 RBX: 0000000000000007 RCX: ffff8eba01f13d80\n[ 190.272038] RDX: ffff8eba01f130c0 RSI: ffff8eba04b6cd00 RDI: ffff8eba0004c700\n[ 190.272042] RBP: ffff8eba0004c700 R08: 0000000000010002 R09: 0000000000000000\n[ 190.272045] R10: 00000000ffff7f52 R11: ffff8eba7f600000 R12: ffff8eba0004c720\n[ 190.272049] R13: ffff8eba00223a00 R14: 0000000000000008 R15: ffff8eba067a8000\n[ 190.272053] FS: 00007f1bd64752c0(0000) GS:ffff8eba7f680000(0000) knlGS:0000000000000000\n[ 190.272057] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 190.272061] CR2: 00007f1bd6662590 CR3: 000000010291e001 CR4: 0000000000370ef0\n[ 190.272070] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[ 190.272073] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[ 190.272077] Call Trace:\n[ 190.272098] \u003cTASK\u003e\n[ 190.272189] ring_buffer_resize+0x2ab/0x460\n[ 190.272199] __tracing_resize_ring_buffer.part.0+0x23/0xa0\n[ 190.272206] tracing_resize_ring_buffer+0x65/0x90\n[ 190.272216] tracing_entries_write+0x74/0xc0\n[ 190.272225] vfs_write+0xf5/0x420\n[ 190.272248] ksys_write+0x67/0xe0\n[ 190.272256] do_syscall_64+0x82/0x170\n[ 190.272363] entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[ 190.272373] RIP: 0033:0x7f1bd657d263\n[ 190.272381] Code: [...]\n[ 190.272385] RSP: 002b:00007ffe72b643f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 190.272391] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f1bd657d263\n[ 190.272395] RDX: 0000000000000002 RSI: 0000555a6eb538e0 RDI: 0000000000000001\n[ 190.272398] RBP: 0000555a6eb538e0 R08: 000000000000000a R09: 0000000000000000\n[ 190.272401] R10: 0000555a6eb55190 R11: 0000000000000246 R12: 00007f1bd6662500\n[ 190.272404] R13: 0000000000000002 R14: 00007f1bd6667c00 R15: 0000000000000002\n[ 190.272412] \u003c/TASK\u003e\n[ 190.272414] ---[ end trace 0000000000000000 ]---\n\nNote that ring_buffer_resize() calls rb_check_pages() only if the parent\ntrace_buffer has recording disabled. Recent commit d78ab792705c\n(\"tracing: Stop current tracer when resizing buffer\") causes that it is\nnow always the case which makes it more likely to experience this issue.\n\nThe window to hit this race is nonetheless very small. To help\nreproducing it, one can add a delay loop in rb_get_reader_page():\n\n ret = rb_head_page_replace(reader, cpu_buffer-\u003ereader_page);\n if (!ret)\n \tgoto spin;\n for (unsigned i = 0; i \u003c 1U \u003c\u003c 26; i++) /* inserted delay loop */\n \t__asm__ __volatile__ (\"\" : : : \"memory\");\n rb_list_head(reader-\u003elist.next)-\u003eprev = \u0026cpu_buffer-\u003ereader_page-\u003elist;\n\n.. \n---truncated---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38601",
"url": "https://www.suse.com/security/cve/CVE-2024-38601"
},
{
"category": "external",
"summary": "SUSE Bug 1226876 for CVE-2024-38601",
"url": "https://bugzilla.suse.com/1226876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38601"
},
{
"cve": "CVE-2024-38608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38608"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Fix netif state handling\n\nmlx5e_suspend cleans resources only if netif_device_present() returns\ntrue. However, mlx5e_resume changes the state of netif, via\nmlx5e_nic_enable, only if reg_state == NETREG_REGISTERED.\nIn the below case, the above leads to NULL-ptr Oops[1] and memory\nleaks:\n\nmlx5e_probe\n _mlx5e_resume\n mlx5e_attach_netdev\n mlx5e_nic_enable \u003c-- netdev not reg, not calling netif_device_attach()\n register_netdev \u003c-- failed for some reason.\nERROR_FLOW:\n _mlx5e_suspend \u003c-- netif_device_present return false, resources aren\u0027t freed :(\n\nHence, clean resources in this case as well.\n\n[1]\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nPGD 0 P4D 0\nOops: 0010 [#1] SMP\nCPU: 2 PID: 9345 Comm: test-ovs-ct-gen Not tainted 6.5.0_for_upstream_min_debug_2023_09_05_16_01 #1\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\nRIP: 0010:0x0\nCode: Unable to access opcode bytes at0xffffffffffffffd6.\nRSP: 0018:ffff888178aaf758 EFLAGS: 00010246\nCall Trace:\n \u003cTASK\u003e\n ? __die+0x20/0x60\n ? page_fault_oops+0x14c/0x3c0\n ? exc_page_fault+0x75/0x140\n ? asm_exc_page_fault+0x22/0x30\n notifier_call_chain+0x35/0xb0\n blocking_notifier_call_chain+0x3d/0x60\n mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]\n mlx5_core_uplink_netdev_event_replay+0x3e/0x60 [mlx5_core]\n mlx5_mdev_netdev_track+0x53/0x60 [mlx5_ib]\n mlx5_ib_roce_init+0xc3/0x340 [mlx5_ib]\n __mlx5_ib_add+0x34/0xd0 [mlx5_ib]\n mlx5r_probe+0xe1/0x210 [mlx5_ib]\n ? auxiliary_match_id+0x6a/0x90\n auxiliary_bus_probe+0x38/0x80\n ? driver_sysfs_add+0x51/0x80\n really_probe+0xc9/0x3e0\n ? driver_probe_device+0x90/0x90\n __driver_probe_device+0x80/0x160\n driver_probe_device+0x1e/0x90\n __device_attach_driver+0x7d/0x100\n bus_for_each_drv+0x80/0xd0\n __device_attach+0xbc/0x1f0\n bus_probe_device+0x86/0xa0\n device_add+0x637/0x840\n __auxiliary_device_add+0x3b/0xa0\n add_adev+0xc9/0x140 [mlx5_core]\n mlx5_rescan_drivers_locked+0x22a/0x310 [mlx5_core]\n mlx5_register_device+0x53/0xa0 [mlx5_core]\n mlx5_init_one_devl_locked+0x5c4/0x9c0 [mlx5_core]\n mlx5_init_one+0x3b/0x60 [mlx5_core]\n probe_one+0x44c/0x730 [mlx5_core]\n local_pci_probe+0x3e/0x90\n pci_device_probe+0xbf/0x210\n ? kernfs_create_link+0x5d/0xa0\n ? sysfs_do_create_link_sd+0x60/0xc0\n really_probe+0xc9/0x3e0\n ? driver_probe_device+0x90/0x90\n __driver_probe_device+0x80/0x160\n driver_probe_device+0x1e/0x90\n __device_attach_driver+0x7d/0x100\n bus_for_each_drv+0x80/0xd0\n __device_attach+0xbc/0x1f0\n pci_bus_add_device+0x54/0x80\n pci_iov_add_virtfn+0x2e6/0x320\n sriov_enable+0x208/0x420\n mlx5_core_sriov_configure+0x9e/0x200 [mlx5_core]\n sriov_numvfs_store+0xae/0x1a0\n kernfs_fop_write_iter+0x10c/0x1a0\n vfs_write+0x291/0x3c0\n ksys_write+0x5f/0xe0\n do_syscall_64+0x3d/0x90\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\n CR2: 0000000000000000\n ---[ end trace 0000000000000000 ]---",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38608",
"url": "https://www.suse.com/security/cve/CVE-2024-38608"
},
{
"category": "external",
"summary": "SUSE Bug 1226746 for CVE-2024-38608",
"url": "https://bugzilla.suse.com/1226746"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38608"
},
{
"cve": "CVE-2024-38618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38618"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: timer: Set lower bound of start tick time\n\nCurrently ALSA timer doesn\u0027t have the lower limit of the start tick\ntime, and it allows a very small size, e.g. 1 tick with 1ns resolution\nfor hrtimer. Such a situation may lead to an unexpected RCU stall,\nwhere the callback repeatedly queuing the expire update, as reported\nby fuzzer.\n\nThis patch introduces a sanity check of the timer start tick time, so\nthat the system returns an error when a too small start size is set.\nAs of this patch, the lower limit is hard-coded to 100us, which is\nsmall enough but can still work somehow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38618",
"url": "https://www.suse.com/security/cve/CVE-2024-38618"
},
{
"category": "external",
"summary": "SUSE Bug 1226754 for CVE-2024-38618",
"url": "https://bugzilla.suse.com/1226754"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38618"
},
{
"cve": "CVE-2024-38621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38621"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: stk1160: fix bounds checking in stk1160_copy_video()\n\nThe subtract in this condition is reversed. The -\u003elength is the length\nof the buffer. The -\u003ebytesused is how many bytes we have copied thus\nfar. When the condition is reversed that means the result of the\nsubtraction is always negative but since it\u0027s unsigned then the result\nis a very high positive value. That means the overflow check is never\ntrue.\n\nAdditionally, the -\u003ebytesused doesn\u0027t actually work for this purpose\nbecause we\u0027re not writing to \"buf-\u003emem + buf-\u003ebytesused\". Instead, the\nmath to calculate the destination where we are writing is a bit\ninvolved. You calculate the number of full lines already written,\nmultiply by two, skip a line if necessary so that we start on an odd\nnumbered line, and add the offset into the line.\n\nTo fix this buffer overflow, just take the actual destination where we\nare writing, if the offset is already out of bounds print an error and\nreturn. Otherwise, write up to buf-\u003elength bytes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38621",
"url": "https://www.suse.com/security/cve/CVE-2024-38621"
},
{
"category": "external",
"summary": "SUSE Bug 1226895 for CVE-2024-38621",
"url": "https://bugzilla.suse.com/1226895"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38621"
},
{
"cve": "CVE-2024-38627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38627"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nstm class: Fix a double free in stm_register_device()\n\nThe put_device(\u0026stm-\u003edev) call will trigger stm_device_release() which\nfrees \"stm\" so the vfree(stm) on the next line is a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38627",
"url": "https://www.suse.com/security/cve/CVE-2024-38627"
},
{
"category": "external",
"summary": "SUSE Bug 1226857 for CVE-2024-38627",
"url": "https://bugzilla.suse.com/1226857"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38627"
},
{
"cve": "CVE-2024-38659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38659"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nenic: Validate length of nl attributes in enic_set_vf_port\n\nenic_set_vf_port assumes that the nl attribute IFLA_PORT_PROFILE\nis of length PORT_PROFILE_MAX and that the nl attributes\nIFLA_PORT_INSTANCE_UUID, IFLA_PORT_HOST_UUID are of length PORT_UUID_MAX.\nThese attributes are validated (in the function do_setlink in rtnetlink.c)\nusing the nla_policy ifla_port_policy. The policy defines IFLA_PORT_PROFILE\nas NLA_STRING, IFLA_PORT_INSTANCE_UUID as NLA_BINARY and\nIFLA_PORT_HOST_UUID as NLA_STRING. That means that the length validation\nusing the policy is for the max size of the attributes and not on exact\nsize so the length of these attributes might be less than the sizes that\nenic_set_vf_port expects. This might cause an out of bands\nread access in the memcpys of the data of these\nattributes in enic_set_vf_port.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38659",
"url": "https://www.suse.com/security/cve/CVE-2024-38659"
},
{
"category": "external",
"summary": "SUSE Bug 1226883 for CVE-2024-38659",
"url": "https://bugzilla.suse.com/1226883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38659"
},
{
"cve": "CVE-2024-38661",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38661"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ns390/ap: Fix crash in AP internal function modify_bitmap()\n\nA system crash like this\n\n Failing address: 200000cb7df6f000 TEID: 200000cb7df6f403\n Fault in home space mode while using kernel ASCE.\n AS:00000002d71bc007 R3:00000003fe5b8007 S:000000011a446000 P:000000015660c13d\n Oops: 0038 ilc:3 [#1] PREEMPT SMP\n Modules linked in: mlx5_ib ...\n CPU: 8 PID: 7556 Comm: bash Not tainted 6.9.0-rc7 #8\n Hardware name: IBM 3931 A01 704 (LPAR)\n Krnl PSW : 0704e00180000000 0000014b75e7b606 (ap_parse_bitmap_str+0x10e/0x1f8)\n R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3\n Krnl GPRS: 0000000000000001 ffffffffffffffc0 0000000000000001 00000048f96b75d3\n 000000cb00000100 ffffffffffffffff ffffffffffffffff 000000cb7df6fce0\n 000000cb7df6fce0 00000000ffffffff 000000000000002b 00000048ffffffff\n 000003ff9b2dbc80 200000cb7df6fcd8 0000014bffffffc0 000000cb7df6fbc8\n Krnl Code: 0000014b75e7b5fc: a7840047 brc 8,0000014b75e7b68a\n 0000014b75e7b600: 18b2 lr %r11,%r2\n #0000014b75e7b602: a7f4000a brc 15,0000014b75e7b616\n \u003e0000014b75e7b606: eb22d00000e6 laog %r2,%r2,0(%r13)\n 0000014b75e7b60c: a7680001 lhi %r6,1\n 0000014b75e7b610: 187b lr %r7,%r11\n 0000014b75e7b612: 84960021 brxh %r9,%r6,0000014b75e7b654\n 0000014b75e7b616: 18e9 lr %r14,%r9\n Call Trace:\n [\u003c0000014b75e7b606\u003e] ap_parse_bitmap_str+0x10e/0x1f8\n ([\u003c0000014b75e7b5dc\u003e] ap_parse_bitmap_str+0xe4/0x1f8)\n [\u003c0000014b75e7b758\u003e] apmask_store+0x68/0x140\n [\u003c0000014b75679196\u003e] kernfs_fop_write_iter+0x14e/0x1e8\n [\u003c0000014b75598524\u003e] vfs_write+0x1b4/0x448\n [\u003c0000014b7559894c\u003e] ksys_write+0x74/0x100\n [\u003c0000014b7618a440\u003e] __do_syscall+0x268/0x328\n [\u003c0000014b761a3558\u003e] system_call+0x70/0x98\n INFO: lockdep is turned off.\n Last Breaking-Event-Address:\n [\u003c0000014b75e7b636\u003e] ap_parse_bitmap_str+0x13e/0x1f8\n Kernel panic - not syncing: Fatal exception: panic_on_oops\n\noccured when /sys/bus/ap/a[pq]mask was updated with a relative mask value\n(like +0x10-0x12,+60,-90) with one of the numeric values exceeding INT_MAX.\n\nThe fix is simple: use unsigned long values for the internal variables. The\ncorrect checks are already in place in the function but a simple int for\nthe internal variables was used with the possibility to overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38661",
"url": "https://www.suse.com/security/cve/CVE-2024-38661"
},
{
"category": "external",
"summary": "SUSE Bug 1226996 for CVE-2024-38661",
"url": "https://bugzilla.suse.com/1226996"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38661"
},
{
"cve": "CVE-2024-38780",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-38780"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndma-buf/sw-sync: don\u0027t enable IRQ from sync_print_obj()\n\nSince commit a6aa8fca4d79 (\"dma-buf/sw-sync: Reduce irqsave/irqrestore from\nknown context\") by error replaced spin_unlock_irqrestore() with\nspin_unlock_irq() for both sync_debugfs_show() and sync_print_obj() despite\nsync_print_obj() is called from sync_debugfs_show(), lockdep complains\ninconsistent lock state warning.\n\nUse plain spin_{lock,unlock}() for sync_print_obj(), for\nsync_debugfs_show() is already using spin_{lock,unlock}_irq().",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-38780",
"url": "https://www.suse.com/security/cve/CVE-2024-38780"
},
{
"category": "external",
"summary": "SUSE Bug 1226886 for CVE-2024-38780",
"url": "https://bugzilla.suse.com/1226886"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-base-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-azure-devel-4.12.14-16.191.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-azure-4.12.14-16.191.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-azure-4.12.14-16.191.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-09T14:01:02Z",
"details": "moderate"
}
],
"title": "CVE-2024-38780"
}
]
}
suse-su-2021:14849-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 11 SP4 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).\n- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563 bnc#1192267).\n- CVE-2014-7841: The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation, when ASCONF is used, allowed remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk (bnc#904899 bnc#905100).\n- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).\n- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673 bnc#1192036).\n- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1188876).\n- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c had a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h incorrectly computed the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262).\n- CVE-2021-3653: A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \u0027int_ctl\u0027 field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. (bnc#1189399).\n- CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2021-3609: A potential local privilege escalation in the CAN BCM networking protocol was fixed (bsc#1187215).\n- CVE-2020-36385: drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c (bnc#1187050).\n\nThe following non-security bugs were fixed:\n\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- sctp: fully initialize v4 addr in some functions (bsc#1188563).\n- sctp: simplify addr copy (bsc#1188563).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "slessp4-kernel-14849,slexsp3-kernel-14849",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_14849-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:14849-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-202114849-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:14849-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html"
},
{
"category": "self",
"summary": "SUSE Bug 1183089",
"url": "https://bugzilla.suse.com/1183089"
},
{
"category": "self",
"summary": "SUSE Bug 1184673",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "self",
"summary": "SUSE Bug 1186109",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "self",
"summary": "SUSE Bug 1187050",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "self",
"summary": "SUSE Bug 1187215",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "self",
"summary": "SUSE Bug 1188172",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "self",
"summary": "SUSE Bug 1188563",
"url": "https://bugzilla.suse.com/1188563"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1188876",
"url": "https://bugzilla.suse.com/1188876"
},
{
"category": "self",
"summary": "SUSE Bug 1189057",
"url": "https://bugzilla.suse.com/1189057"
},
{
"category": "self",
"summary": "SUSE Bug 1189262",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "self",
"summary": "SUSE Bug 1189399",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "self",
"summary": "SUSE Bug 1190117",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "self",
"summary": "SUSE Bug 1190351",
"url": "https://bugzilla.suse.com/1190351"
},
{
"category": "self",
"summary": "SUSE Bug 1191315",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "self",
"summary": "SUSE Bug 1191660",
"url": "https://bugzilla.suse.com/1191660"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1192036",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 904899",
"url": "https://bugzilla.suse.com/904899"
},
{
"category": "self",
"summary": "SUSE Bug 905100",
"url": "https://bugzilla.suse.com/905100"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7841 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7841/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-36385 page",
"url": "https://www.suse.com/security/cve/CVE-2020-36385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33033 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3655 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3679 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3772 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38160 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38198 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42008 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-12-01T16:01:25Z",
"generator": {
"date": "2021-12-01T16:01:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:14849-1",
"initial_release_date": "2021-12-01T16:01:25Z",
"revision_history": [
{
"date": "2021-12-01T16:01:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-default-3.0.101-108.132.1.i586",
"product_id": "kernel-default-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-default-base-3.0.101-108.132.1.i586",
"product_id": "kernel-default-base-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-default-devel-3.0.101-108.132.1.i586",
"product_id": "kernel-default-devel-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-ec2-3.0.101-108.132.1.i586",
"product_id": "kernel-ec2-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-ec2-base-3.0.101-108.132.1.i586",
"product_id": "kernel-ec2-base-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.132.1.i586",
"product_id": "kernel-ec2-devel-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-pae-3.0.101-108.132.1.i586",
"product_id": "kernel-pae-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-base-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-pae-base-3.0.101-108.132.1.i586",
"product_id": "kernel-pae-base-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-pae-devel-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-pae-devel-3.0.101-108.132.1.i586",
"product_id": "kernel-pae-devel-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-source-3.0.101-108.132.1.i586",
"product_id": "kernel-source-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-syms-3.0.101-108.132.1.i586",
"product_id": "kernel-syms-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-trace-3.0.101-108.132.1.i586",
"product_id": "kernel-trace-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-trace-base-3.0.101-108.132.1.i586",
"product_id": "kernel-trace-base-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-trace-devel-3.0.101-108.132.1.i586",
"product_id": "kernel-trace-devel-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-xen-3.0.101-108.132.1.i586",
"product_id": "kernel-xen-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-xen-base-3.0.101-108.132.1.i586",
"product_id": "kernel-xen-base-3.0.101-108.132.1.i586"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.132.1.i586",
"product": {
"name": "kernel-xen-devel-3.0.101-108.132.1.i586",
"product_id": "kernel-xen-devel-3.0.101-108.132.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-bigmem-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-bigmem-3.0.101-108.132.1.ppc64",
"product_id": "kernel-bigmem-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"product_id": "kernel-bigmem-base-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"product_id": "kernel-bigmem-devel-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-default-3.0.101-108.132.1.ppc64",
"product_id": "kernel-default-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-default-base-3.0.101-108.132.1.ppc64",
"product_id": "kernel-default-base-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-default-devel-3.0.101-108.132.1.ppc64",
"product_id": "kernel-default-devel-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-ppc64-3.0.101-108.132.1.ppc64",
"product_id": "kernel-ppc64-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"product_id": "kernel-ppc64-base-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"product_id": "kernel-ppc64-devel-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-source-3.0.101-108.132.1.ppc64",
"product_id": "kernel-source-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-syms-3.0.101-108.132.1.ppc64",
"product_id": "kernel-syms-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-trace-3.0.101-108.132.1.ppc64",
"product_id": "kernel-trace-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-trace-base-3.0.101-108.132.1.ppc64",
"product_id": "kernel-trace-base-3.0.101-108.132.1.ppc64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.132.1.ppc64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.132.1.ppc64",
"product_id": "kernel-trace-devel-3.0.101-108.132.1.ppc64"
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.132.1.s390x",
"product": {
"name": "kernel-default-3.0.101-108.132.1.s390x",
"product_id": "kernel-default-3.0.101-108.132.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.132.1.s390x",
"product": {
"name": "kernel-default-base-3.0.101-108.132.1.s390x",
"product_id": "kernel-default-base-3.0.101-108.132.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.132.1.s390x",
"product": {
"name": "kernel-default-devel-3.0.101-108.132.1.s390x",
"product_id": "kernel-default-devel-3.0.101-108.132.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-3.0.101-108.132.1.s390x",
"product": {
"name": "kernel-default-man-3.0.101-108.132.1.s390x",
"product_id": "kernel-default-man-3.0.101-108.132.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.132.1.s390x",
"product": {
"name": "kernel-source-3.0.101-108.132.1.s390x",
"product_id": "kernel-source-3.0.101-108.132.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.132.1.s390x",
"product": {
"name": "kernel-syms-3.0.101-108.132.1.s390x",
"product_id": "kernel-syms-3.0.101-108.132.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.132.1.s390x",
"product": {
"name": "kernel-trace-3.0.101-108.132.1.s390x",
"product_id": "kernel-trace-3.0.101-108.132.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.132.1.s390x",
"product": {
"name": "kernel-trace-base-3.0.101-108.132.1.s390x",
"product_id": "kernel-trace-base-3.0.101-108.132.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.132.1.s390x",
"product": {
"name": "kernel-trace-devel-3.0.101-108.132.1.s390x",
"product_id": "kernel-trace-devel-3.0.101-108.132.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-default-3.0.101-108.132.1.x86_64",
"product_id": "kernel-default-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-default-base-3.0.101-108.132.1.x86_64",
"product_id": "kernel-default-base-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-default-devel-3.0.101-108.132.1.x86_64",
"product_id": "kernel-default-devel-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-ec2-3.0.101-108.132.1.x86_64",
"product_id": "kernel-ec2-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-base-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-ec2-base-3.0.101-108.132.1.x86_64",
"product_id": "kernel-ec2-base-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"product_id": "kernel-ec2-devel-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-source-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-source-3.0.101-108.132.1.x86_64",
"product_id": "kernel-source-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-syms-3.0.101-108.132.1.x86_64",
"product_id": "kernel-syms-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-trace-3.0.101-108.132.1.x86_64",
"product_id": "kernel-trace-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-base-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-trace-base-3.0.101-108.132.1.x86_64",
"product_id": "kernel-trace-base-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-trace-devel-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-trace-devel-3.0.101-108.132.1.x86_64",
"product_id": "kernel-trace-devel-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-xen-3.0.101-108.132.1.x86_64",
"product_id": "kernel-xen-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-base-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-xen-base-3.0.101-108.132.1.x86_64",
"product_id": "kernel-xen-base-3.0.101-108.132.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-3.0.101-108.132.1.x86_64",
"product": {
"name": "kernel-xen-devel-3.0.101-108.132.1.x86_64",
"product_id": "kernel-xen-devel-3.0.101-108.132.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_sles:11:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-bigmem-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-base-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-bigmem-devel-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-default-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-default-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.132.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x"
},
"product_reference": "kernel-default-3.0.101-108.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-default-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-default-base-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-default-base-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.132.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x"
},
"product_reference": "kernel-default-base-3.0.101-108.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-default-base-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-default-devel-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-default-devel-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.132.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x"
},
"product_reference": "kernel-default-devel-3.0.101-108.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-default-devel-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-3.0.101-108.132.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x"
},
"product_reference": "kernel-default-man-3.0.101-108.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-ec2-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-ec2-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-ec2-base-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-base-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-ec2-base-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ec2-devel-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-pae-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-base-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-pae-base-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-pae-devel-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-pae-devel-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-ppc64-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-base-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-ppc64-devel-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-source-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-source-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.132.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x"
},
"product_reference": "kernel-source-3.0.101-108.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-source-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-syms-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-syms-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.132.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x"
},
"product_reference": "kernel-syms-3.0.101-108.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-syms-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-trace-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-trace-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.132.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x"
},
"product_reference": "kernel-trace-3.0.101-108.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-trace-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-trace-base-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-trace-base-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.132.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x"
},
"product_reference": "kernel-trace-base-3.0.101-108.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-base-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-trace-base-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-trace-devel-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.132.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.132.1.ppc64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.132.1.s390x as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x"
},
"product_reference": "kernel-trace-devel-3.0.101-108.132.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-trace-devel-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-trace-devel-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-xen-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-xen-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-xen-base-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-base-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-xen-base-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.132.1.i586 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586"
},
"product_reference": "kernel-xen-devel-3.0.101-108.132.1.i586",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-3.0.101-108.132.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
},
"product_reference": "kernel-xen-devel-3.0.101-108.132.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-7841",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7841"
}
],
"notes": [
{
"category": "general",
"text": "The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7841",
"url": "https://www.suse.com/security/cve/CVE-2014-7841"
},
{
"category": "external",
"summary": "SUSE Bug 904899 for CVE-2014-7841",
"url": "https://bugzilla.suse.com/904899"
},
{
"category": "external",
"summary": "SUSE Bug 905100 for CVE-2014-7841",
"url": "https://bugzilla.suse.com/905100"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "moderate"
}
],
"title": "CVE-2014-7841"
},
{
"cve": "CVE-2020-36385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-36385"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-36385",
"url": "https://www.suse.com/security/cve/CVE-2020-36385"
},
{
"category": "external",
"summary": "SUSE Bug 1187050 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187050"
},
{
"category": "external",
"summary": "SUSE Bug 1187052 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1187052"
},
{
"category": "external",
"summary": "SUSE Bug 1189302 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1189302"
},
{
"category": "external",
"summary": "SUSE Bug 1196174 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196174"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1196914"
},
{
"category": "external",
"summary": "SUSE Bug 1200084 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1200084"
},
{
"category": "external",
"summary": "SUSE Bug 1201734 for CVE-2020-36385",
"url": "https://bugzilla.suse.com/1201734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "important"
}
],
"title": "CVE-2020-36385"
},
{
"cve": "CVE-2021-20265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20265"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20265",
"url": "https://www.suse.com/security/cve/CVE-2021-20265"
},
{
"category": "external",
"summary": "SUSE Bug 1183089 for CVE-2021-20265",
"url": "https://bugzilla.suse.com/1183089"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-20265",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-20265",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "moderate"
}
],
"title": "CVE-2021-20265"
},
{
"cve": "CVE-2021-33033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33033"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33033",
"url": "https://www.suse.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "SUSE Bug 1186109 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "external",
"summary": "SUSE Bug 1186283 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186283"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "moderate"
}
],
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3542",
"url": "https://www.suse.com/security/cve/CVE-2021-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1186063 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1186063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "important"
}
],
"title": "CVE-2021-3542"
},
{
"cve": "CVE-2021-3609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3609"
}
],
"notes": [
{
"category": "general",
"text": ".A flaw was found in the CAN BCM networking protocol in the Linux kernel, where a local attacker can abuse a flaw in the CAN subsystem to corrupt memory, crash the system or escalate privileges. This race condition in net/can/bcm.c in the Linux kernel allows for local privilege escalation to root.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3609",
"url": "https://www.suse.com/security/cve/CVE-2021-3609"
},
{
"category": "external",
"summary": "SUSE Bug 1187215 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1187215"
},
{
"category": "external",
"summary": "SUSE Bug 1188323 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188323"
},
{
"category": "external",
"summary": "SUSE Bug 1188720 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1188720"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1190276"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3609",
"url": "https://bugzilla.suse.com/1196810"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "moderate"
}
],
"title": "CVE-2021-3609"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3655"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3655",
"url": "https://www.suse.com/security/cve/CVE-2021-3655"
},
{
"category": "external",
"summary": "SUSE Bug 1188563 for CVE-2021-3655",
"url": "https://bugzilla.suse.com/1188563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "low"
}
],
"title": "CVE-2021-3655"
},
{
"cve": "CVE-2021-3679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3679"
}
],
"notes": [
{
"category": "general",
"text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3679",
"url": "https://www.suse.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "SUSE Bug 1189057 for CVE-2021-3679",
"url": "https://bugzilla.suse.com/1189057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "moderate"
}
],
"title": "CVE-2021-3679"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-3772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3772"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3772",
"url": "https://www.suse.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "SUSE Bug 1190351 for CVE-2021-3772",
"url": "https://bugzilla.suse.com/1190351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "moderate"
}
],
"title": "CVE-2021-3772"
},
{
"cve": "CVE-2021-38160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38160"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38160",
"url": "https://www.suse.com/security/cve/CVE-2021-38160"
},
{
"category": "external",
"summary": "SUSE Bug 1190117 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "external",
"summary": "SUSE Bug 1190118 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190118"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "moderate"
}
],
"title": "CVE-2021-38160"
},
{
"cve": "CVE-2021-38198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38198"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38198",
"url": "https://www.suse.com/security/cve/CVE-2021-38198"
},
{
"category": "external",
"summary": "SUSE Bug 1189262 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "external",
"summary": "SUSE Bug 1189278 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189278"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "important"
}
],
"title": "CVE-2021-38198"
},
{
"cve": "CVE-2021-42008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42008"
}
],
"notes": [
{
"category": "general",
"text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42008",
"url": "https://www.suse.com/security/cve/CVE-2021-42008"
},
{
"category": "external",
"summary": "SUSE Bug 1191315 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "external",
"summary": "SUSE Bug 1191660 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191660"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "important"
}
],
"title": "CVE-2021-42008"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-bigmem-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-default-man-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ec2-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-pae-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-ppc64-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-source-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-syms-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.ppc64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.s390x",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-trace-devel-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-base-3.0.101-108.132.1.x86_64",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.i586",
"SUSE Linux Enterprise Server 11 SP4-LTSS:kernel-xen-devel-3.0.101-108.132.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-01T16:01:25Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
suse-su-2022:2103-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 15 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2019-19377: Fixed an user-after-free that could be triggered when an attacker mounts a crafted btrfs filesystem image. (bnc#1158266)\n- CVE-2022-1184: Fixed an use-after-free and memory errors in ext4 when mounting and operating on a corrupted image. (bsc#1198577)\n- CVE-2017-13695: Fixed a bug that caused a stack dump allowing local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism via a crafted ACPI table. (bnc#1055710)\n- CVE-2022-1729: Fixed a sys_perf_event_open() race condition against self (bsc#1199507).\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2021-39711: In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1197219).\n- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).\n- CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c. (bnc#1191958)\n- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).\n- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)\n- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).\n- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)\n- CVE-2022-1974: Fixed an use-after-free that could causes kernel crash by simulating an nfc device from user-space. (bsc#1200144)\n- CVE-2022-1975: Fixed a bug that allows an attacker to crash the linux kernel by simulating nfc device from user-space. (bsc#1200143)\n- CVE-2022-21499: Reinforce the kernel lockdown feature, until now it\u0027s been trivial to break out of it with kgdb or kdb. (bsc#1199426)\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).\n- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).\n- CVE-2019-20811: Fixed issue in rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, where a reference count is mishandled (bnc#1172456).\n\nThe following non-security bugs were fixed:\n\n- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bsc#1199399).\n- btrfs: tree-checker: fix incorrect printk format (bsc#1200249).\n- lib: dimlib: fix help text typos (bsc#1198776).\n- lib: dimlib: make DIMLIB a hidden symbol (bsc#1198776).\n- linux/dim: Add completions count to dim_sample (bsc#1198776).\n- linux/dim: Fix -Wunused-const-variable warnings (bsc#1198776).\n- linux/dim: Fix overflow in dim calculation (bsc#1198776).\n- linux/dim: Implement RDMA adaptive moderation (DIM) (bsc#1198776).\n- linux/dim: Move implementation to .c files (bsc#1198776).\n- linux/dim: Move logic to dim.h (bsc#1198776).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1198776).\n- linux/dim: Rename externally exposed macros (bsc#1198776).\n- linux/dim: Rename externally used net_dim members (bsc#1198776).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1198776).\n- net: ena: A typo fix in the file ena_com.h (bsc#1198776).\n- net: ena: Add capabilities field with support for ENI stats capability (bsc#1198776).\n- net: ena: add device distinct log prefix to files (bsc#1198776).\n- net: ena: Add first_interrupt field to napi struct (bsc#1198776).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (bsc#1198776).\n- net: ena: add jiffies of last napi call to stats (bsc#1198776).\n- net: ena: add missing ethtool TX timestamping indication (bsc#1198776).\n- net: ena: add reserved PCI device ID (bsc#1198776).\n- net: ena: add support for reporting of packet drops (bsc#1198776).\n- net: ena: add support for the rx offset feature (bsc#1198776).\n- net: ena: add support for traffic mirroring (bsc#1198776).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1198776).\n- net: ena: aggregate stats increase into a function (bsc#1198776).\n- net: ena: allow setting the hash function without changing the key (bsc#1198776).\n- net: ena: avoid memory access violation by validating req_id properly (bsc#1198776).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1198776).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1198776).\n- net: ena: Capitalize all log strings and improve code readability (bsc#1198776).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1198776).\n- net: ena: Change ENI stats support check to use capabilities field (bsc#1198776).\n- net: ena: Change license into format to SPDX in all files (bsc#1198776).\n- net: ena: Change log message to netif/dev function (bsc#1198776).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1198776).\n- net: ena: Change return value of ena_calc_io_queue_size() to void (bsc#1198776).\n- net: ena: Change RSS related macros and variables names (bsc#1198776).\n- net: ena: Change the name of bad_csum variable (bsc#1198776).\n- net: ena: changes to RSS hash key allocation (bsc#1198776).\n- net: ena: clean up indentation issue (bsc#1198776).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1198776).\n- net: ena: cosmetic: code reorderings (bsc#1198776).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1198776).\n- net: ena: cosmetic: fix line break issues (bsc#1198776).\n- net: ena: cosmetic: fix spacing issues (bsc#1198776).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1198776).\n- net: ena: cosmetic: minor code changes (bsc#1198776).\n- net: ena: cosmetic: remove unnecessary code (bsc#1198776).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1198776).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1198776).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1198776).\n- net: ena: do not wake up tx queue when down (bsc#1198776).\n- net: ena: drop superfluous prototype (bsc#1198776).\n- net: ena: ena-com.c: prevent NULL pointer dereference (bsc#1198776).\n- net: ena: enable support of rss hash key and function changes (bsc#1198776).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1198776).\n- net: ena: ethtool: Add new device statistics (bsc#1198776).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1198776).\n- net: ena: ethtool: convert stat_offset to 64 bit resolution (bsc#1198776).\n- net: ena: ethtool: get_channels: use combined only (bsc#1198776).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1198776).\n- net: ena: ethtool: support set_channels callback (bsc#1198776).\n- net: ena: ethtool: use correct value for crc32 hash (bsc#1198776).\n- net: ena: Fix all static chekers\u0027 warnings (bsc#1198776).\n- net: ena: Fix build warning in ena_xdp_set() (bsc#1198776).\n- net: ena: fix coding style nits (bsc#1198776).\n- net: ena: fix continuous keep-alive resets (bsc#1198776).\n- net: ena: fix corruption of dev_idx_to_host_tbl (bsc#1198776).\n- net: ena: fix default tx interrupt moderation interval (bsc#1198776).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1198776).\n- net: ena: Fix error handling when calculating max IO queues number (bsc#1198776).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1198776).\n- net: ena: fix inaccurate print type (bsc#1198776).\n- net: ena: fix incorrect default RSS key (bsc#1198776).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1198776).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1198776).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (bsc#1198776).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (bsc#1198776).\n- net: ena: fix napi handler misbehavior when the napi budget is zero (bsc#1198776).\n- net: ena: fix packet\u0027s addresses for rx_offset feature (bsc#1198776).\n- net: ena: fix potential crash when rxfh key is NULL (bsc#1198776).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1198776).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (bsc#1198776).\n- net: ena: fix update of interrupt moderation register (bsc#1198776).\n- net: ena: fix uses of round_jiffies() (bsc#1198776).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1198776).\n- net: ena: Fix wrong rx request id by resetting device (bsc#1198776).\n- net: ena: handle bad request id in ena_netdev (bsc#1198776).\n- net: ena: Improve error logging in driver (bsc#1198776).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (bsc#1198776).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1198776).\n- net: ena: Make missed_tx stat incremental (bsc#1198776).\n- net: ena: make symbol \u0027ena_alloc_map_page\u0027 static (bsc#1198776).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1198776).\n- net: ena: Move reset completion print to the reset function (bsc#1198776).\n- net: ena: multiple queue creation related cleanups (bsc#1198776).\n- net: ena: Prevent reset after device destruction (bsc#1198776).\n- net: ena: re-organize code to improve readability (bsc#1198776).\n- net: ena: reduce driver load time (bsc#1198776).\n- net: ena: reimplement set/get_coalesce() (bsc#1198776).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1198776).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1198776).\n- net: ena: remove code that does nothing (bsc#1198776).\n- net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1198776).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1198776).\n- net: ena: remove extra words from comments (bsc#1198776).\n- net: ena: Remove module param and change message severity (bsc#1198776).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1198776).\n- net: ena: remove redundant print of number of queues (bsc#1198776).\n- net: ena: Remove redundant print of placement policy (bsc#1198776).\n- net: ena: Remove redundant return code check (bsc#1198776).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1198776).\n- net: ena: Remove unused code (bsc#1198776).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1198776).\n- net: ena: rss: do not allocate key when not supported (bsc#1198776).\n- net: ena: rss: fix failure to get indirection table (bsc#1198776).\n- net: ena: rss: store hash function as values and not bits (bsc#1198776).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1198776).\n- net: ena: set initial DMA width to avoid intel iommu issue (bsc#1198776).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1198776).\n- net: ena: store values in their appropriate variables types (bsc#1198776).\n- net: ena: support new LLQ acceleration mode (bsc#1198776).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1198776).\n- net: ena: use constant value for net_device allocation (bsc#1198776).\n- net: ena: Use dev_alloc() in RX buffer allocation (bsc#1198776).\n- net: ena: use explicit variable size for clarity (bsc#1198776).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1198776).\n- net: mana: Add counter for packet dropped by XDP (bsc#1195651).\n- net: mana: Add counter for XDP_TX (bsc#1195651).\n- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).\n- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).\n- net: mana: Reuse XDP dropped page (bsc#1195651).\n- net: update net_dim documentation after rename (bsc#1198776).\n- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).\n- scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825).\n- SUNRPC: change locking for xs_swap_enable/disable (bsc#1196367).\n- x86/pm: Save the MSR validity status at context setup (bsc#1114648).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1114648).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2103,SUSE-SLE-Module-Live-Patching-15-2022-2103,SUSE-SLE-Product-HA-15-2022-2103,SUSE-SLE-Product-HPC-15-2022-2103,SUSE-SLE-Product-SLES-15-2022-2103,SUSE-SLE-Product-SLES_SAP-15-2022-2103",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2103-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2103-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222103-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2103-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html"
},
{
"category": "self",
"summary": "SUSE Bug 1028340",
"url": "https://bugzilla.suse.com/1028340"
},
{
"category": "self",
"summary": "SUSE Bug 1055710",
"url": "https://bugzilla.suse.com/1055710"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1087082",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "self",
"summary": "SUSE Bug 1114648",
"url": "https://bugzilla.suse.com/1114648"
},
{
"category": "self",
"summary": "SUSE Bug 1158266",
"url": "https://bugzilla.suse.com/1158266"
},
{
"category": "self",
"summary": "SUSE Bug 1172456",
"url": "https://bugzilla.suse.com/1172456"
},
{
"category": "self",
"summary": "SUSE Bug 1183723",
"url": "https://bugzilla.suse.com/1183723"
},
{
"category": "self",
"summary": "SUSE Bug 1187055",
"url": "https://bugzilla.suse.com/1187055"
},
{
"category": "self",
"summary": "SUSE Bug 1191647",
"url": "https://bugzilla.suse.com/1191647"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1195651",
"url": "https://bugzilla.suse.com/1195651"
},
{
"category": "self",
"summary": "SUSE Bug 1196367",
"url": "https://bugzilla.suse.com/1196367"
},
{
"category": "self",
"summary": "SUSE Bug 1196426",
"url": "https://bugzilla.suse.com/1196426"
},
{
"category": "self",
"summary": "SUSE Bug 1197219",
"url": "https://bugzilla.suse.com/1197219"
},
{
"category": "self",
"summary": "SUSE Bug 1197343",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "self",
"summary": "SUSE Bug 1198400",
"url": "https://bugzilla.suse.com/1198400"
},
{
"category": "self",
"summary": "SUSE Bug 1198516",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "self",
"summary": "SUSE Bug 1198577",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "self",
"summary": "SUSE Bug 1198687",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "self",
"summary": "SUSE Bug 1198742",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "self",
"summary": "SUSE Bug 1198776",
"url": "https://bugzilla.suse.com/1198776"
},
{
"category": "self",
"summary": "SUSE Bug 1198825",
"url": "https://bugzilla.suse.com/1198825"
},
{
"category": "self",
"summary": "SUSE Bug 1199012",
"url": "https://bugzilla.suse.com/1199012"
},
{
"category": "self",
"summary": "SUSE Bug 1199063",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "self",
"summary": "SUSE Bug 1199314",
"url": "https://bugzilla.suse.com/1199314"
},
{
"category": "self",
"summary": "SUSE Bug 1199399",
"url": "https://bugzilla.suse.com/1199399"
},
{
"category": "self",
"summary": "SUSE Bug 1199426",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "self",
"summary": "SUSE Bug 1199505",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "self",
"summary": "SUSE Bug 1199507",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "self",
"summary": "SUSE Bug 1199605",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "self",
"summary": "SUSE Bug 1199650",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "self",
"summary": "SUSE Bug 1200143",
"url": "https://bugzilla.suse.com/1200143"
},
{
"category": "self",
"summary": "SUSE Bug 1200144",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "self",
"summary": "SUSE Bug 1200249",
"url": "https://bugzilla.suse.com/1200249"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-13695 page",
"url": "https://www.suse.com/security/cve/CVE-2017-13695/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-19377 page",
"url": "https://www.suse.com/security/cve/CVE-2019-19377/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20292 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20321 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33061 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38208 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39711 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1011 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1184 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1184/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1353 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1419 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1516 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1652 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1652/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1729 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1734 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1974 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1975 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21123 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21125 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21127 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21166 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21180 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21499 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-30594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-30594/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-06-16T13:20:52Z",
"generator": {
"date": "2022-06-16T13:20:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2103-1",
"initial_release_date": "2022-06-16T13:20:52Z",
"revision_history": [
{
"date": "2022-06-16T13:20:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product_id": "dlm-kmp-default-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-default-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-default-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-default-base-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-default-devel-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-default-extra-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-obs-build-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-obs-qa-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-syms-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-syms-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-vanilla-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.aarch64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-150000.150.92.2.noarch",
"product": {
"name": "kernel-devel-4.12.14-150000.150.92.2.noarch",
"product_id": "kernel-devel-4.12.14-150000.150.92.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-150000.150.92.2.noarch",
"product": {
"name": "kernel-docs-4.12.14-150000.150.92.2.noarch",
"product_id": "kernel-docs-4.12.14-150000.150.92.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-150000.150.92.2.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-150000.150.92.2.noarch",
"product_id": "kernel-docs-html-4.12.14-150000.150.92.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-150000.150.92.2.noarch",
"product": {
"name": "kernel-macros-4.12.14-150000.150.92.2.noarch",
"product_id": "kernel-macros-4.12.14-150000.150.92.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-150000.150.92.2.noarch",
"product": {
"name": "kernel-source-4.12.14-150000.150.92.2.noarch",
"product_id": "kernel-source-4.12.14-150000.150.92.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-150000.150.92.2.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-150000.150.92.2.noarch",
"product_id": "kernel-source-vanilla-4.12.14-150000.150.92.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-debug-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-debug-base-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-default-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-default-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-default-base-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-default-devel-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-default-extra-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"product_id": "kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-obs-build-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-syms-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-vanilla-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"product_id": "dlm-kmp-default-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-default-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-default-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-default-base-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-default-devel-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-default-extra-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-default-man-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-default-man-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-obs-build-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-obs-qa-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-syms-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-syms-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-vanilla-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-zfcpdump-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-150000.150.92.2.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.92.2.s390x",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product_id": "dlm-kmp-default-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-debug-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-debug-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-debug-base-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-debug-devel-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-debug-livepatch-devel-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-default-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-default-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-default-base-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-default-extra-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-default-livepatch-devel-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"product": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"product_id": "kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-obs-qa-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-syms-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-syms-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-vanilla-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.x86_64",
"product_id": "kernel-vanilla-livepatch-devel-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"product_id": "reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 15",
"product": {
"name": "SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-live-patching:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64 as component of SUSE Linux Enterprise Live Patching 15",
"product_id": "SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64"
},
"product_reference": "kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Availability Extension 15",
"product_id": "SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-default-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "kernel-default-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "kernel-default-man-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "kernel-syms-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server 15-LTSS",
"product_id": "SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-default-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-docs-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-150000.150.92.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch"
},
"product_reference": "kernel-source-4.12.14-150000.150.92.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
},
"product_reference": "reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-13695",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-13695"
}
],
"notes": [
{
"category": "general",
"text": "The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-13695",
"url": "https://www.suse.com/security/cve/CVE-2017-13695"
},
{
"category": "external",
"summary": "SUSE Bug 1055710 for CVE-2017-13695",
"url": "https://bugzilla.suse.com/1055710"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2017-13695",
"url": "https://bugzilla.suse.com/1087082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "low"
}
],
"title": "CVE-2017-13695"
},
{
"cve": "CVE-2019-19377",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-19377"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-19377",
"url": "https://www.suse.com/security/cve/CVE-2019-19377"
},
{
"category": "external",
"summary": "SUSE Bug 1158266 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1158266"
},
{
"category": "external",
"summary": "SUSE Bug 1162338 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1162338"
},
{
"category": "external",
"summary": "SUSE Bug 1162369 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1162369"
},
{
"category": "external",
"summary": "SUSE Bug 1173871 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1173871"
},
{
"category": "external",
"summary": "SUSE Bug 1211495 for CVE-2019-19377",
"url": "https://bugzilla.suse.com/1211495"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "important"
}
],
"title": "CVE-2019-19377"
},
{
"cve": "CVE-2019-20811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20811"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20811",
"url": "https://www.suse.com/security/cve/CVE-2019-20811"
},
{
"category": "external",
"summary": "SUSE Bug 1172456 for CVE-2019-20811",
"url": "https://bugzilla.suse.com/1172456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2019-20811"
},
{
"cve": "CVE-2021-20292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20292"
}
],
"notes": [
{
"category": "general",
"text": "There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20292",
"url": "https://www.suse.com/security/cve/CVE-2021-20292"
},
{
"category": "external",
"summary": "SUSE Bug 1183723 for CVE-2021-20292",
"url": "https://bugzilla.suse.com/1183723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2021-20292"
},
{
"cve": "CVE-2021-20321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20321"
}
],
"notes": [
{
"category": "general",
"text": "A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20321",
"url": "https://www.suse.com/security/cve/CVE-2021-20321"
},
{
"category": "external",
"summary": "SUSE Bug 1191647 for CVE-2021-20321",
"url": "https://bugzilla.suse.com/1191647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2021-20321"
},
{
"cve": "CVE-2021-33061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33061"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33061",
"url": "https://www.suse.com/security/cve/CVE-2021-33061"
},
{
"category": "external",
"summary": "SUSE Bug 1196426 for CVE-2021-33061",
"url": "https://bugzilla.suse.com/1196426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2021-33061"
},
{
"cve": "CVE-2021-38208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38208"
}
],
"notes": [
{
"category": "general",
"text": "net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38208",
"url": "https://www.suse.com/security/cve/CVE-2021-38208"
},
{
"category": "external",
"summary": "SUSE Bug 1187055 for CVE-2021-38208",
"url": "https://bugzilla.suse.com/1187055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2021-38208"
},
{
"cve": "CVE-2021-39711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39711"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39711",
"url": "https://www.suse.com/security/cve/CVE-2021-39711"
},
{
"category": "external",
"summary": "SUSE Bug 1197219 for CVE-2021-39711",
"url": "https://bugzilla.suse.com/1197219"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2021-39711"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2022-1011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1011"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1011",
"url": "https://www.suse.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "SUSE Bug 1197343 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "external",
"summary": "SUSE Bug 1197344 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197344"
},
{
"category": "external",
"summary": "SUSE Bug 1198687 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212322 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1212322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-1184",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1184"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1184",
"url": "https://www.suse.com/security/cve/CVE-2022-1184"
},
{
"category": "external",
"summary": "SUSE Bug 1198577 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1198577"
},
{
"category": "external",
"summary": "SUSE Bug 1210859 for CVE-2022-1184",
"url": "https://bugzilla.suse.com/1210859"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1353"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1353",
"url": "https://www.suse.com/security/cve/CVE-2022-1353"
},
{
"category": "external",
"summary": "SUSE Bug 1198516 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "external",
"summary": "SUSE Bug 1212293 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1212293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1419"
}
],
"notes": [
{
"category": "general",
"text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1419",
"url": "https://www.suse.com/security/cve/CVE-2022-1419"
},
{
"category": "external",
"summary": "SUSE Bug 1198742 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "external",
"summary": "SUSE Bug 1201655 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1201655"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-1419"
},
{
"cve": "CVE-2022-1516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1516"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1516",
"url": "https://www.suse.com/security/cve/CVE-2022-1516"
},
{
"category": "external",
"summary": "SUSE Bug 1199012 for CVE-2022-1516",
"url": "https://bugzilla.suse.com/1199012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-1652",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1652"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1652",
"url": "https://www.suse.com/security/cve/CVE-2022-1652"
},
{
"category": "external",
"summary": "SUSE Bug 1199063 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "external",
"summary": "SUSE Bug 1200057 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200057"
},
{
"category": "external",
"summary": "SUSE Bug 1200751 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200751"
},
{
"category": "external",
"summary": "SUSE Bug 1201034 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201034"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212307 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1212307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-1652"
},
{
"cve": "CVE-2022-1729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1729"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found the Linux kernel in perf_event_open() which can be exploited by an unprivileged user to gain root privileges. The bug allows to build several exploit primitives such as kernel address information leak, arbitrary execution, etc.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1729",
"url": "https://www.suse.com/security/cve/CVE-2022-1729"
},
{
"category": "external",
"summary": "SUSE Bug 1199507 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199507"
},
{
"category": "external",
"summary": "SUSE Bug 1199697 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1199697"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1729",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "important"
}
],
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1734",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1734"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1734",
"url": "https://www.suse.com/security/cve/CVE-2022-1734"
},
{
"category": "external",
"summary": "SUSE Bug 1199605 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "external",
"summary": "SUSE Bug 1199606 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199606"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "important"
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-1974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1974"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s NFC core functionality due to a race condition between kobject creation and delete. This vulnerability allows a local attacker with CAP_NET_ADMIN privilege to leak kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1974",
"url": "https://www.suse.com/security/cve/CVE-2022-1974"
},
{
"category": "external",
"summary": "SUSE Bug 1200144 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200144"
},
{
"category": "external",
"summary": "SUSE Bug 1200265 for CVE-2022-1974",
"url": "https://bugzilla.suse.com/1200265"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1975"
}
],
"notes": [
{
"category": "general",
"text": "There is a sleep-in-atomic bug in /net/nfc/netlink.c that allows an attacker to crash the Linux kernel by simulating a nfc device from user-space.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1975",
"url": "https://www.suse.com/security/cve/CVE-2022-1975"
},
{
"category": "external",
"summary": "SUSE Bug 1200143 for CVE-2022-1975",
"url": "https://bugzilla.suse.com/1200143"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-21123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21123"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21123",
"url": "https://www.suse.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209075 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1209075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21125"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21125",
"url": "https://www.suse.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209074 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1209074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21127"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21127",
"url": "https://www.suse.com/security/cve/CVE-2022-21127"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1200549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-21127"
},
{
"cve": "CVE-2022-21166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21166"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21166",
"url": "https://www.suse.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209073 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1209073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21180"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21180",
"url": "https://www.suse.com/security/cve/CVE-2022-21180"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1212313 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1212313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "moderate"
}
],
"title": "CVE-2022-21180"
},
{
"cve": "CVE-2022-21499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21499"
}
],
"notes": [
{
"category": "general",
"text": "KGDB and KDB allow read and write access to kernel memory, and thus should be restricted during lockdown. An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered. CVSS 3.1 Base Score 6.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21499",
"url": "https://www.suse.com/security/cve/CVE-2022-21499"
},
{
"category": "external",
"summary": "SUSE Bug 1199426 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "external",
"summary": "SUSE Bug 1200059 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1200059"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1203034"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212315 for CVE-2022-21499",
"url": "https://bugzilla.suse.com/1212315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "important"
}
],
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-30594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-30594"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-30594",
"url": "https://www.suse.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "SUSE Bug 1199505 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "external",
"summary": "SUSE Bug 1199602 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199602"
},
{
"category": "external",
"summary": "SUSE Bug 1201549 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1201549"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1204132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:cluster-md-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:dlm-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:gfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise High Availability Extension 15:ocfs2-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-ESPOS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-default-livepatch-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.ppc64le",
"SUSE Linux Enterprise Live Patching 15:kernel-livepatch-4_12_14-150000_150_92-default-1-150000.1.3.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-default-man-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.aarch64",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.s390x",
"SUSE Linux Enterprise Server 15-LTSS:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-default-devel-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-devel-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-docs-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-macros-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-obs-build-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-source-4.12.14-150000.150.92.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-syms-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:kernel-vanilla-base-4.12.14-150000.150.92.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15:reiserfs-kmp-default-4.12.14-150000.150.92.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-16T13:20:52Z",
"details": "important"
}
],
"title": "CVE-2022-30594"
}
]
}
suse-su-2021:3806-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP3 kernel for Azure was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n\nThe following non-security bugs were fixed:\n\n- ABI: sysfs-kernel-slab: Document some stats (git-fixes).\n- ALSA: hda: fix general protection fault in azx_runtime_idle (git-fixes).\n- ALSA: hda: Free card instance properly at probe errors (git-fixes).\n- ALSA: hda/realtek: Fix mic mute LED for the HP Spectre x360 14 (git-fixes).\n- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).\n- ALSA: hda: Use position buffer for SKL+ again (git-fixes).\n- ALSA: ua101: fix division by zero at probe (git-fixes).\n- ALSA: uapi: Fix a C++ style comment in asound.h (git-fixes).\n- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).\n- ALSA: usb-audio: Add minimal-mute notion in dB mapping table (bsc#1192375).\n- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).\n- ALSA: usb-audio: Fix dB level of Bose Revolve+ SoundLink (bsc#1192375).\n- ALSA: usb-audio: Use int for dB map values (bsc#1192375).\n- ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE (bsc#1192473).\n- ASoC: cs42l42: Correct some register default values (git-fixes).\n- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).\n- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).\n- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).\n- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).\n- ASoC: rockchip: Use generic dmaengine code (git-fixes).\n- ASoC: SOF: topology: do not power down primary core during topology removal (git-fixes).\n- ASoC: topology: Fix stub for snd_soc_tplg_component_remove() (git-fixes).\n- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).\n- ath10k: fix control-message timeout (git-fixes).\n- ath10k: fix division by zero in send path (git-fixes).\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).\n- ath10k: sdio: Add missing BH locking around napi_schdule() (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).\n- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).\n- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- blacklist.conf: 5c9d706f6133 (\u0027bpf: Fix BPF_LSM kconfig symbol dependency\u0027) Not needed since 30897832d8b9 (\u0027bpf: Allow local storage to be used from LSM programs\u0027) is not backported.\n- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).\n- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).\n- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22574)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22574).\n- bpf: Fix BPF_JIT kconfig symbol dependency (git-fixes jsc#SLE-22574).\n- bpf: Fix potential race in tail call compatibility check (git-fixes).\n- bpf, kconfig: Add consolidated menu entry for bpf with core options (jsc#SLE-22574).\n- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).\n- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).\n- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).\n- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).\n- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).\n- config: disable unprivileged BPF by default (jsc#SLE-22573)\n- crypto: caam - disable pkc for non-E SoCs (git-fixes).\n- crypto: qat - detect PFVF collision after ACK (git-fixes).\n- crypto: qat - disregard spurious PFVF interrupts (git-fixes).\n- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).\n- drm/amdgpu/display: add quirk handling for stutter mode (git-fixes).\n- drm/amdgpu: fix warning for overflow check (git-fixes).\n- drm/amdgpu/gmc6: fix DMA mask from 44 to 40 bits (git-fixes).\n- drm/i915: Introduce intel_hpd_hotplug_irqs() (bsc#1192758).\n- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).\n- drm/msm: potential error pointer dereference in init() (git-fixes).\n- drm/msm: uninitialized variable in msm_gem_import() (git-fixes).\n- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).\n- drm/ttm: stop calling tt_swapin in vm_access (git-fixes).\n- drm/v3d: fix wait for TMU write combiner flush (git-fixes).\n- EDAC/amd64: Set proper family type for Family 19h Models 20h-2Fh (bsc#1192288).\n- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).\n- Eradicate Patch-mainline: No The pre-commit check can reject this deprecated tag then.\n- exfat: fix erroneous discard when clear cluster bit (git-fixes).\n- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).\n- exfat: properly set s_time_gran (bsc#1192328).\n- exfat: truncate atimes to 2s granularity (bsc#1192328).\n- firmware/psci: fix application of sizeof to pointer (git-fixes).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- fuse: fix page stealing (bsc#1192718).\n- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).\n- gpio: mpc8xxx: Use \u0027devm_gpiochip_add_data()\u0027 to simplify the code and avoid a leak (git-fixes).\n- gpio/rockchip: add driver for rockchip gpio (bsc#1192217).\n- gpio/rockchip: drop irq_gc_lock/irq_gc_unlock for irq set type (bsc#1192217).\n- gpio/rockchip: extended debounce support is only available on v2 (bsc#1192217).\n- gpio/rockchip: fetch deferred output settings on probe (bsc#1192217).\n- gpio/rockchip: fix get_direction value handling (bsc#1192217).\n- gpio/rockchip: support next version gpio controller (bsc#1192217).\n- gpio/rockchip: use struct rockchip_gpio_regs for gpio controller (bsc#1192217).\n- gve: Avoid freeing NULL pointer (git-fixes).\n- gve: Correct available tx qpl check (git-fixes).\n- gve: fix gve_get_stats() (git-fixes).\n- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).\n- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).\n- HID: u2fzero: clarify error check and length calculations (git-fixes).\n- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).\n- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).\n- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).\n- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).\n- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).\n- i40e: Fix ATR queue selection (git-fixes).\n- i40e: fix endless loop under rtnl (git-fixes).\n- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).\n- iavf: fix double unlock of crit_lock (git-fixes).\n- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).\n- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).\n- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).\n- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).\n- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).\n- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).\n- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).\n- ionic: do not remove netdev-\u003edev_addr when syncing uc list (bsc#1167773).\n- iwlwifi: mvm: fix some kerneldoc issues (git-fixes).\n- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).\n- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).\n- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).\n- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).\n- KVM: s390: index kvm-\u003earch.idle_mask by vcpu_idx (bsc#1133021).\n- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).\n- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- media: cedrus: Fix SUNXI tile size calculation (git-fixes).\n- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).\n- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).\n- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: add missing em28xx_close_extension (git-fixes).\n- media: em28xx: Do not use ops-\u003esuspend if it is NULL (git-fixes).\n- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).\n- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).\n- media: mtk-vpu: Fix a resource leak in the error handling path of \u0027mtk_vpu_probe()\u0027 (git-fixes).\n- media: mxl111sf: change mutex_init() location (git-fixes).\n- media: radio-wl1273: Avoid card name truncation (git-fixes).\n- media: si470x: Avoid card name truncation (git-fixes).\n- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).\n- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).\n- media: tm6000: Avoid card name truncation (git-fixes).\n- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).\n- memstick: avoid out-of-range warning (git-fixes).\n- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).\n- mlx5: count all link events (git-fixes).\n- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).\n- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).\n- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).\n- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).\n- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).\n- Move upstreamed sound fix into sorted section\n- mt76: mt7615: fix endianness warning in mt7615_mac_write_txwi (git-fixes).\n- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).\n- mt76: mt7915: fix muar_idx in mt7915_mcu_alloc_sta_req() (git-fixes).\n- mt76: mt7915: fix possible infinite loop release semaphore (git-fixes).\n- mt76: mt7915: fix sta_rec_wtbl tag len (git-fixes).\n- mwifiex: fix division by zero in fw download path (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).\n- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).\n- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).\n- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).\n- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).\n- net/mlx4_en: Resolve bad operstate value (git-fixes).\n- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).\n- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).\n- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).\n- net: mscc: ocelot: fix hardware timestamp dequeue logic.\n- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).\n- net/smc: Correct smc link connection counter in case of smc client (git-fixes).\n- net/smc: fix \u0027workqueue leaked lock\u0027 in smc_conn_abort_work (git-fixes).\n- nvme-pci: set min_align_mask (bsc#1191851).\n- ocfs2: do not zero pages beyond i_size (bsc#1190795).\n- ocfs2: fix data corruption on truncate (bsc#1190795).\n- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).\n- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).\n- PCI: aardvark: Do not unmask unused interrupts (git-fixes).\n- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).\n- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).\n- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).\n- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).\n- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).\n- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).\n- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).\n- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).\n- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).\n- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).\n- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).\n- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).\n- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).\n- pinctrl: pinctrl-rockchip: Fix a bunch of kerneldoc misdemeanours (bsc#1192217).\n- pinctrl/rockchip: add a queue for deferred pin output settings on probe (bsc#1192217).\n- pinctrl/rockchip: add pinctrl device to gpio bank struct (bsc#1192217).\n- pinctrl: rockchip: add rk3308 SoC support (bsc#1192217).\n- pinctrl: rockchip: add support for rk3568 (bsc#1192217).\n- pinctrl/rockchip: always enable clock for gpio controller (bsc#1192217).\n- pinctrl: rockchip: clear int status when driver probed (bsc#1192217).\n- pinctrl: rockchip: create irq mapping in gpio_to_irq (bsc#1192217).\n- pinctrl: rockchip: do coding style for mux route struct (bsc#1192217).\n- pinctrl/rockchip: drop the gpio related codes (bsc#1192217).\n- pinctrl: rockchip: enable gpio pclk for rockchip_gpio_to_irq (bsc#1192217).\n- pinctrl: rockchip: make driver be tristate module (bsc#1192217).\n- pinctrl: rockchip: Replace HTTP links with HTTPS ones (bsc#1192217).\n- pinctrl: rockchip: return ENOMEM instead of EINVAL if allocation fails (bsc#1192217).\n- pinctrl/rockchip: separate struct rockchip_pin_bank to a head file (bsc#1192217).\n- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).\n- PM: sleep: Do not let \u0027syscore\u0027 devices runtime-suspend during system transitions (git-fixes).\n- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).\n- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).\n- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).\n- printk/console: Allow to disable console output by using console=\u0027\u0027 or console=null (bsc#1192753).\n- printk: handle blank console arguments passed in (bsc#1192753).\n- qed: Fix missing error code in qed_slowpath_start() (git-fixes).\n- qed: Handle management FW error (git-fixes).\n- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).\n- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).\n- r8152: add a helper function about setting EEE (git-fixes).\n- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).\n- r8152: Disable PLA MCU clock speed down (git-fixes).\n- r8152: disable U2P3 for RTL8153B (git-fixes).\n- r8152: divide the tx and rx bottom functions (git-fixes).\n- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).\n- r8152: fix runtime resume for linking change (git-fixes).\n- r8152: replace array with linking list for rx information (git-fixes).\n- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).\n- r8152: saving the settings of EEE (git-fixes).\n- r8152: separate the rx buffer size (git-fixes).\n- r8152: use alloc_pages for rx buffer (git-fixes).\n- random: fix crash on multiple early calls to add_bootloader_randomness() (bsc#1184924)\n- README.BRANCH: Add Oscar Salvador as SLE15-SP3 maintainer\n- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).\n- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).\n- Revert \u0027ibmvnic: check failover_pending in login response\u0027 (bsc#1190523 ltc#194510).\n- Revert \u0027platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes\u0027 (git-fixes).\n- Revert \u0027r8152: adjust the settings about MAC clock speed down for RTL8153\u0027 (git-fixes).\n- Revert \u0027scsi: ufs: fix a missing check of devm_reset_control_get\u0027 (git-fixes).\n- Revert \u0027x86/kvm: fix vcpu-id indexed array sizes\u0027 (git-fixes).\n- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).\n- rsi: fix control-message timeout (git-fixes).\n- rsi: Fix module dev_oper_mode parameter description (git-fixes).\n- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- s390/dasd: fix use after free in dasd path handling (git-fixes).\n- s390/pci: fix use after free of zpci_dev (git-fixes).\n- s390/pci: fix zpci_zdev_put() on reserve (git-fixes).\n- s390/qeth: fix deadlock during failing recovery (git-fixes).\n- s390/qeth: Fix deadlock in remove_discipline (git-fixes).\n- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).\n- s390/topology: clear thread/group maps for offline cpus (git-fixes).\n- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).\n- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).\n- scsi: core: Fix spelling in a source code comment (git-fixes).\n- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).\n- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).\n- scsi: dc395: Fix error case unwinding (git-fixes).\n- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).\n- scsi: FlashPoint: Rename si_flags field (git-fixes).\n- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).\n- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).\n- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).\n- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).\n- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).\n- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).\n- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).\n- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).\n- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).\n- scsi: snic: Fix an error message (git-fixes).\n- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).\n- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).\n- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).\n- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).\n- staging: r8712u: fix control-message timeout (git-fixes).\n- staging: rtl8192u: fix control-message timeouts (git-fixes).\n- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).\n- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).\n- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).\n- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).\n- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).\n- swiotlb: factor out a nr_slots helper (bsc#1191851).\n- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).\n- swiotlb: respect min_align_mask (bsc#1191851).\n- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).\n- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).\n- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- Update patches.suse/NFS-Do-uncached-readdir-when-we-re-seeking-a-cookie-.patch (bsc#1191628 bsc#1192549). dir_cookie is a pointer to the cookie in older kernels, not the cookie itself.\n- Update patch reference for AMDGPU fix (bsc#1180749)\n- usb: gadget: hid: fix error code in do_config() (git-fixes).\n- USB: iowarrior: fix control-message timeouts (git-fixes).\n- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).\n- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).\n- usbnet: fix error return code in usbnet_probe() (git-fixes).\n- usbnet: sanity check for maxpacket (git-fixes).\n- USB: serial: keyspan: fix memleak on probe errors (git-fixes).\n- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).\n- virtio-gpu: fix possible memory allocation failure (git-fixes).\n- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two\u0027s complement (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1152489).\n- x86/msi: Force affinity setup before startup (bsc#1152489).\n- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).\n- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).\n- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).\n- xen: Fix implicit type conversion (git-fixes).\n- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).\n- xfs: do not allow log writes if the data device is readonly (bsc#1192229).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3806,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-3806",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3806-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3806-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213806-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3806-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1157177",
"url": "https://bugzilla.suse.com/1157177"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1169263",
"url": "https://bugzilla.suse.com/1169263"
},
{
"category": "self",
"summary": "SUSE Bug 1170269",
"url": "https://bugzilla.suse.com/1170269"
},
{
"category": "self",
"summary": "SUSE Bug 1176940",
"url": "https://bugzilla.suse.com/1176940"
},
{
"category": "self",
"summary": "SUSE Bug 1180749",
"url": "https://bugzilla.suse.com/1180749"
},
{
"category": "self",
"summary": "SUSE Bug 1184924",
"url": "https://bugzilla.suse.com/1184924"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1190523",
"url": "https://bugzilla.suse.com/1190523"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1191628",
"url": "https://bugzilla.suse.com/1191628"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191851",
"url": "https://bugzilla.suse.com/1191851"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1191980",
"url": "https://bugzilla.suse.com/1191980"
},
{
"category": "self",
"summary": "SUSE Bug 1192045",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "self",
"summary": "SUSE Bug 1192217",
"url": "https://bugzilla.suse.com/1192217"
},
{
"category": "self",
"summary": "SUSE Bug 1192229",
"url": "https://bugzilla.suse.com/1192229"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 1192273",
"url": "https://bugzilla.suse.com/1192273"
},
{
"category": "self",
"summary": "SUSE Bug 1192288",
"url": "https://bugzilla.suse.com/1192288"
},
{
"category": "self",
"summary": "SUSE Bug 1192328",
"url": "https://bugzilla.suse.com/1192328"
},
{
"category": "self",
"summary": "SUSE Bug 1192375",
"url": "https://bugzilla.suse.com/1192375"
},
{
"category": "self",
"summary": "SUSE Bug 1192473",
"url": "https://bugzilla.suse.com/1192473"
},
{
"category": "self",
"summary": "SUSE Bug 1192549",
"url": "https://bugzilla.suse.com/1192549"
},
{
"category": "self",
"summary": "SUSE Bug 1192718",
"url": "https://bugzilla.suse.com/1192718"
},
{
"category": "self",
"summary": "SUSE Bug 1192740",
"url": "https://bugzilla.suse.com/1192740"
},
{
"category": "self",
"summary": "SUSE Bug 1192745",
"url": "https://bugzilla.suse.com/1192745"
},
{
"category": "self",
"summary": "SUSE Bug 1192750",
"url": "https://bugzilla.suse.com/1192750"
},
{
"category": "self",
"summary": "SUSE Bug 1192753",
"url": "https://bugzilla.suse.com/1192753"
},
{
"category": "self",
"summary": "SUSE Bug 1192758",
"url": "https://bugzilla.suse.com/1192758"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE Bug 1192802",
"url": "https://bugzilla.suse.com/1192802"
},
{
"category": "self",
"summary": "SUSE Bug 1192896",
"url": "https://bugzilla.suse.com/1192896"
},
{
"category": "self",
"summary": "SUSE Bug 1192906",
"url": "https://bugzilla.suse.com/1192906"
},
{
"category": "self",
"summary": "SUSE Bug 1192918",
"url": "https://bugzilla.suse.com/1192918"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0941 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-11-25T13:19:50Z",
"generator": {
"date": "2021-11-25T13:19:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3806-1",
"initial_release_date": "2021-11-25T13:19:50Z",
"revision_history": [
{
"date": "2021-11-25T13:19:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.31.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.31.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.31.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.31.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.31.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.31.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.31.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.31.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.31.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.31.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.31.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.31.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.31.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.31.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.31.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.31.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.31.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0941"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0941",
"url": "https://www.suse.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "SUSE Bug 1192045 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "external",
"summary": "SUSE Bug 1192048 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:50Z",
"details": "important"
}
],
"title": "CVE-2021-0941"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:50Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:50Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-source-azure-5.3.18-38.31.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:50Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
suse-su-2021:3807-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP2 Azure kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n\nThe following non-security bugs were fixed:\n\n- ABI: sysfs-kernel-slab: Document some stats (git-fixes).\n- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).\n- ALSA: ua101: fix division by zero at probe (git-fixes).\n- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).\n- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).\n- ASoC: cs42l42: Correct some register default values (git-fixes).\n- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).\n- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).\n- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).\n- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).\n- ASoC: rockchip: Use generic dmaengine code (git-fixes).\n- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).\n- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).\n- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).\n- Eradicate Patch-mainline: No The pre-commit check can reject this deprecated tag then.\n- Fix problem with missing installkernel on Tumbleweed.\n- HID: u2fzero: clarify error check and length calculations (git-fixes).\n- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).\n- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).\n- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).\n- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).\n- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).\n- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).\n- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).\n- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).\n- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).\n- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).\n- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).\n- PCI: aardvark: Do not unmask unused interrupts (git-fixes).\n- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).\n- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).\n- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).\n- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).\n- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).\n- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).\n- Revert \u0027ibmvnic: check failover_pending in login response\u0027 (bsc#1190523 ltc#194510).\n- Revert \u0027platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes\u0027 (git-fixes).\n- Revert \u0027r8152: adjust the settings about MAC clock speed down for RTL8153\u0027 (git-fixes).\n- Revert \u0027scsi: ufs: fix a missing check of devm_reset_control_get\u0027 (git-fixes).\n- Revert \u0027x86/kvm: fix vcpu-id indexed array sizes\u0027 (git-fixes).\n- USB: iowarrior: fix control-message timeouts (git-fixes).\n- USB: serial: keyspan: fix memleak on probe errors (git-fixes).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- Update patches.suse/NFS-Do-uncached-readdir-when-we-re-seeking-a-cookie-.patch (bsc#1191628 bsc#1192549). dir_cookie is a pointer to the cookie in older kernels, not the cookie itself.\n- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).\n- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).\n- ath10k: fix control-message timeout (git-fixes).\n- ath10k: fix division by zero in send path (git-fixes).\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).\n- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).\n- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).\n- bpf: Fix potential race in tail call compatibility check (git-fixes).\n- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).\n- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).\n- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).\n- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).\n- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).\n- config: disable unprivileged BPF by default (jsc#SLE-22573)\n- crypto: caam - disable pkc for non-E SoCs (git-fixes).\n- crypto: pcrypt - Delay write to padata-\u003einfo (git-fixes).\n- crypto: qat - detect PFVF collision after ACK (git-fixes).\n- crypto: qat - disregard spurious PFVF interrupts (git-fixes).\n- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).\n- drm/amdgpu: fix warning for overflow check (git-fixes).\n- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).\n- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).\n- drm/v3d: fix wait for TMU write combiner flush (git-fixes).\n- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- exfat: fix erroneous discard when clear cluster bit (git-fixes).\n- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).\n- exfat: properly set s_time_gran (bsc#1192328).\n- exfat: truncate atimes to 2s granularity (bsc#1192328).\n- firmware/psci: fix application of sizeof to pointer (git-fixes).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- fuse: fix page stealing (bsc#1192718).\n- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).\n- gpio: mpc8xxx: Use \u0027devm_gpiochip_add_data()\u0027 to simplify the code and avoid a leak (git-fixes).\n- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).\n- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).\n- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).\n- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).\n- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).\n- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).\n- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).\n- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).\n- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).\n- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).\n- media: cedrus: Fix SUNXI tile size calculation (git-fixes).\n- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).\n- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).\n- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: Do not use ops-\u003esuspend if it is NULL (git-fixes).\n- media: em28xx: add missing em28xx_close_extension (git-fixes).\n- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).\n- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).\n- media: mtk-vpu: Fix a resource leak in the error handling path of \u0027mtk_vpu_probe()\u0027 (git-fixes).\n- media: mxl111sf: change mutex_init() location (git-fixes).\n- media: radio-wl1273: Avoid card name truncation (git-fixes).\n- media: si470x: Avoid card name truncation (git-fixes).\n- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).\n- media: tm6000: Avoid card name truncation (git-fixes).\n- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).\n- memstick: avoid out-of-range warning (git-fixes).\n- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).\n- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).\n- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).\n- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).\n- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).\n- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- mwifiex: fix division by zero in fw download path (git-fixes).\n- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).\n- net: mscc: ocelot: fix hardware timestamp dequeue logic.\n- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).\n- nvme-pci: set min_align_mask (bsc#1191851).\n- ocfs2: do not zero pages beyond i_size (bsc#1190795).\n- ocfs2: fix data corruption on truncate (bsc#1190795).\n- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).\n- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).\n- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).\n- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).\n- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).\n- printk/console: Allow to disable console output by using console=\u0027\u0027 or console=null (bsc#1192753).\n- printk: handle blank console arguments passed in (bsc#1192753).\n- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).\n- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).\n- r8152: Disable PLA MCU clock speed down (git-fixes).\n- r8152: add a helper function about setting EEE (git-fixes).\n- r8152: disable U2P3 for RTL8153B (git-fixes).\n- r8152: divide the tx and rx bottom functions (git-fixes).\n- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).\n- r8152: fix runtime resume for linking change (git-fixes).\n- r8152: limit the RX buffer size of RTL8153A for USB 2.0 (git-fixes).\n- r8152: replace array with linking list for rx information (git-fixes).\n- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).\n- r8152: saving the settings of EEE (git-fixes).\n- r8152: separate the rx buffer size (git-fixes).\n- r8152: use alloc_pages for rx buffer (git-fixes).\n- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).\n- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).\n- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).\n- rsi: Fix module dev_oper_mode parameter description (git-fixes).\n- rsi: fix control-message timeout (git-fixes).\n- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- s390/qeth: Fix deadlock in remove_discipline (git-fixes).\n- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).\n- s390/qeth: fix deadlock during failing recovery (git-fixes).\n- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).\n- scsi: FlashPoint: Rename si_flags field (git-fixes).\n- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).\n- scsi: core: Fix spelling in a source code comment (git-fixes).\n- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).\n- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).\n- scsi: dc395: Fix error case unwinding (git-fixes).\n- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).\n- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).\n- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).\n- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).\n- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).\n- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).\n- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).\n- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).\n- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).\n- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).\n- scsi: snic: Fix an error message (git-fixes).\n- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).\n- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).\n- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).\n- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).\n- series.conf: cleanup\n- series.conf: cleanup\n- series.conf: whitespace and comment cleanup No effect on expanded tree.\n- staging: r8712u: fix control-message timeout (git-fixes).\n- staging: rtl8192u: fix control-message timeouts (git-fixes).\n- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).\n- swiotlb-xen: avoid double free (git-fixes).\n- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).\n- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).\n- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).\n- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).\n- swiotlb: factor out a nr_slots helper (bsc#1191851).\n- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).\n- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).\n- swiotlb: respect min_align_mask (bsc#1191851).\n- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).\n- tracing/histogram: Do not copy the fixed-size char array field over the field size (git-fixes).\n- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).\n- tracing: use %ps format string to print symbols (git-fixes).\n- usb: gadget: hid: fix error code in do_config() (git-fixes).\n- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).\n- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).\n- usbnet: fix error return code in usbnet_probe() (git-fixes).\n- usbnet: sanity check for maxpacket (git-fixes).\n- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).\n- virtio-gpu: fix possible memory allocation failure (git-fixes).\n- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two\u0027s complement (git-fixes).\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- x86/Xen: swap NX determination and GDT setup on BSP (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1152489).\n- x86/msi: Force affinity setup before startup (bsc#1152489).\n- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).\n- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).\n- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).\n- xen/privcmd: fix error handling in mmap-resource processing (git-fixes).\n- xen/x86: fix PV trap handling on secondary processors (git-fixes).\n- xen: Fix implicit type conversion (git-fixes).\n- xfs: do not allow log writes if the data device is readonly (bsc#1192229).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3807,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3807",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3807-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3807-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213807-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3807-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2021-November/020844.html"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1169263",
"url": "https://bugzilla.suse.com/1169263"
},
{
"category": "self",
"summary": "SUSE Bug 1170269",
"url": "https://bugzilla.suse.com/1170269"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1190523",
"url": "https://bugzilla.suse.com/1190523"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1191628",
"url": "https://bugzilla.suse.com/1191628"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191851",
"url": "https://bugzilla.suse.com/1191851"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1191980",
"url": "https://bugzilla.suse.com/1191980"
},
{
"category": "self",
"summary": "SUSE Bug 1192045",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "self",
"summary": "SUSE Bug 1192229",
"url": "https://bugzilla.suse.com/1192229"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 1192273",
"url": "https://bugzilla.suse.com/1192273"
},
{
"category": "self",
"summary": "SUSE Bug 1192328",
"url": "https://bugzilla.suse.com/1192328"
},
{
"category": "self",
"summary": "SUSE Bug 1192549",
"url": "https://bugzilla.suse.com/1192549"
},
{
"category": "self",
"summary": "SUSE Bug 1192718",
"url": "https://bugzilla.suse.com/1192718"
},
{
"category": "self",
"summary": "SUSE Bug 1192740",
"url": "https://bugzilla.suse.com/1192740"
},
{
"category": "self",
"summary": "SUSE Bug 1192745",
"url": "https://bugzilla.suse.com/1192745"
},
{
"category": "self",
"summary": "SUSE Bug 1192750",
"url": "https://bugzilla.suse.com/1192750"
},
{
"category": "self",
"summary": "SUSE Bug 1192753",
"url": "https://bugzilla.suse.com/1192753"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE Bug 1192802",
"url": "https://bugzilla.suse.com/1192802"
},
{
"category": "self",
"summary": "SUSE Bug 1192896",
"url": "https://bugzilla.suse.com/1192896"
},
{
"category": "self",
"summary": "SUSE Bug 1192906",
"url": "https://bugzilla.suse.com/1192906"
},
{
"category": "self",
"summary": "SUSE Bug 1192918",
"url": "https://bugzilla.suse.com/1192918"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0941 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-11-25T13:56:38Z",
"generator": {
"date": "2021-11-25T13:56:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3807-1",
"initial_release_date": "2021-11-25T13:56:38Z",
"revision_history": [
{
"date": "2021-11-25T13:56:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-18.75.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-18.75.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-18.75.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-18.75.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-18.75.1.noarch",
"product_id": "kernel-source-azure-5.3.18-18.75.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-18.75.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-18.75.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-18.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-18.75.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-18.75.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-18.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-18.75.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-18.75.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-18.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-18.75.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-18.75.1.x86_64",
"product_id": "kernel-azure-5.3.18-18.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-18.75.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-18.75.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-18.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-18.75.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-18.75.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-18.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-18.75.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-18.75.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-18.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-18.75.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-18.75.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-18.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-18.75.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-18.75.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-18.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-18.75.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-18.75.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-18.75.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-18.75.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-18.75.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-18.75.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-18.75.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-18.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-18.75.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-18.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-18.75.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-18.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-18.75.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-18.75.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-18.75.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-18.75.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0941"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0941",
"url": "https://www.suse.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "SUSE Bug 1192045 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "external",
"summary": "SUSE Bug 1192048 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:56:38Z",
"details": "important"
}
],
"title": "CVE-2021-0941"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:56:38Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:56:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:56:38Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:56:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-azure-devel-5.3.18-18.75.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-devel-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-source-azure-5.3.18-18.75.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:kernel-syms-azure-5.3.18-18.75.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:56:38Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
suse-su-2022:2083-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\nThe SUSE Linux Enterprise 12 SP4 kernel was updated.\n\nThe following security bugs were fixed:\n\n- CVE-2022-21127: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21123: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21125: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21180: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-21166: Fixed a stale MMIO data transient which can be exploited to speculatively/transiently disclose information via spectre like attacks. (bsc#1199650)\n- CVE-2022-1652: Fixed a statically allocated error counter inside the floppy kernel module (bsc#1199063).\n- CVE-2022-1734: Fixed a r/w use-after-free when non synchronized between cleanup routine and firmware download routine. (bnc#1199605)\n- CVE-2021-39711: Fixed a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1197219).\n- CVE-2022-30594: Fixed restriction bypass on setting the PT_SUSPEND_SECCOMP flag (bnc#1199505).\n- CVE-2021-33061: Fixed insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters that may have allowed an authenticated user to potentially enable denial of service via local access (bnc#1196426).\n- CVE-2022-1516: Fixed null-ptr-deref caused by x25_disconnect (bsc#1199012).\n- CVE-2021-20321: Fixed a race condition accessing file object in the OverlayFS subsystem in the way users do rename in specific way with OverlayFS. A local user could have used this flaw to crash the system (bnc#1191647).\n- CVE-2022-1419: Fixed a concurrency use-after-free in vgem_gem_dumb_create (bsc#1198742).\n- CVE-2021-43389: Fixed an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2019-20811: Fixed issue in rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, where a reference count is mishandled (bnc#1172456).\n- CVE-2021-38208: Fixed a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call (bnc#1187055).\n- CVE-2022-1353: Fixed access controll to kernel memory in the pfkey_register function in net/key/af_key.c. (bnc#1198516)\n- CVE-2021-20292: Fixed object validation prior to performing operations on the object in nouveau_sgdma_create_ttm in Nouveau DRM subsystem (bnc#1183723).\n- CVE-2022-1011: Fixed an use-after-free vulnerability which could allow a local attacker to retireve (partial) /etc/shadow hashes or any other data from filesystem when he can mount a FUSE filesystems. (bnc#1197343)\n\nThe following non-security bugs were fixed:\n\n- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bsc#1199399).\n- btrfs: relocation: Only remove reloc rb_trees if reloc control has been initialized (bsc#1199399).\n- debug: Lock down kgdb (bsc#1199426).\n- dimlib: make DIMLIB a hidden symbol (bsc#1197099 jsc#SLE-24124).\n- lib/dim: Fix -Wunused-const-variable warnings (bsc#1197099 jsc#SLE-24124).\n- lib/dim: fix help text typos (bsc#1197099 jsc#SLE-24124).\n- linux/dim: Add completions count to dim_sample (bsc#1197099 jsc#SLE-24124).\n- linux/dim: Fix overflow in dim calculation (bsc#1197099 jsc#SLE-24124).\n- linux/dim: Implement RDMA adaptive moderation (DIM) (bsc#1197099 jsc#SLE-24124).\n- linux/dim: Move implementation to .c files (bsc#1197099 jsc#SLE-24124).\n- linux/dim: Move logic to dim.h (bsc#1197099 jsc#SLE-24124).\n- linux/dim: Remove \u0027net\u0027 prefix from internal DIM members (bsc#1197099 jsc#SLE-24124).\n- linux/dim: Rename externally exposed macros (bsc#1197099 jsc#SLE-24124).\n- linux/dim: Rename externally used net_dim members (bsc#1197099 jsc#SLE-24124).\n- linux/dim: Rename net_dim_sample() to net_dim_update_sample() (bsc#1197099 jsc#SLE-24124).\n- net: ena: A typo fix in the file ena_com.h (bsc#1197099 jsc#SLE-24124).\n- net: ena: Add capabilities field with support for ENI stats capability (bsc#1197099 jsc#SLE-24124).\n- net: ena: add device distinct log prefix to files (bsc#1197099 jsc#SLE-24124).\n- net: ena: Add first_interrupt field to napi struct (bsc#1197099 jsc#SLE-24124).\n- net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (bsc#1197099 jsc#SLE-24124).\n- net: ena: add jiffies of last napi call to stats (bsc#1197099 jsc#SLE-24124).\n- net: ena: add missing ethtool TX timestamping indication (bsc#1197099 jsc#SLE-24124).\n- net: ena: add reserved PCI device ID (bsc#1197099 jsc#SLE-24124).\n- net: ena: add support for reporting of packet drops (bsc#1197099 jsc#SLE-24124).\n- net: ena: add support for the rx offset feature (bsc#1197099 jsc#SLE-24124).\n- net: ena: add support for traffic mirroring (bsc#1197099 jsc#SLE-24124).\n- net: ena: add unmask interrupts statistics to ethtool (bsc#1197099 jsc#SLE-24124).\n- net: ena: aggregate stats increase into a function (bsc#1197099 jsc#SLE-24124).\n- net: ena: allow setting the hash function without changing the key (bsc#1197099 jsc#SLE-24124).\n- net: ena: avoid memory access violation by validating req_id properly (bsc#1197099 jsc#SLE-24124).\n- net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1197099 jsc#SLE-24124).\n- net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1197099 jsc#SLE-24124).\n- net: ena: Capitalize all log strings and improve code readability (bsc#1197099 jsc#SLE-24124).\n- net: ena: change default RSS hash function to Toeplitz (bsc#1197099 jsc#SLE-24124).\n- net: ena: Change ENI stats support check to use capabilities field (bsc#1197099 jsc#SLE-24124).\n- net: ena: Change license into format to SPDX in all files (bsc#1197099 jsc#SLE-24124).\n- net: ena: Change log message to netif/dev function (bsc#1197099 jsc#SLE-24124).\n- net: ena: change num_queues to num_io_queues for clarity and consistency (bsc#1197099 jsc#SLE-24124).\n- net: ena: Change return value of ena_calc_io_queue_size() to void (bsc#1197099 jsc#SLE-24124).\n- net: ena: Change RSS related macros and variables names (bsc#1197099 jsc#SLE-24124).\n- net: ena: Change the name of bad_csum variable (bsc#1197099 jsc#SLE-24124).\n- net: ena: changes to RSS hash key allocation (bsc#1197099 jsc#SLE-24124).\n- net: ena: clean up indentation issue (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: code reorderings (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: fix line break issues (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: fix spacing issues (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: minor code changes (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: remove unnecessary code (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1197099 jsc#SLE-24124).\n- net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1197099 jsc#SLE-24124).\n- net: ena: do not wake up tx queue when down (bsc#1197099 jsc#SLE-24124).\n- net: ena: drop superfluous prototype (bsc#1197099 jsc#SLE-24124).\n- net: ena: ena-com.c: prevent NULL pointer dereference (bsc#1197099 jsc#SLE-24124).\n- net: ena: enable support of rss hash key and function changes (bsc#1197099 jsc#SLE-24124).\n- net: ena: enable the interrupt_moderation in driver_supported_features (bsc#1197099 jsc#SLE-24124).\n- net: ena: ethtool: Add new device statistics (bsc#1197099 jsc#SLE-24124).\n- net: ena: ethtool: clean up minor indentation issue (bsc#1197099 jsc#SLE-24124).\n- net: ena: ethtool: convert stat_offset to 64 bit resolution (bsc#1197099 jsc#SLE-24124).\n- net: ena: ethtool: get_channels: use combined only (bsc#1197099 jsc#SLE-24124).\n- net: ena: ethtool: remove redundant non-zero check on rc (bsc#1197099 jsc#SLE-24124).\n- net: ena: ethtool: support set_channels callback (bsc#1197099 jsc#SLE-24124).\n- net: ena: ethtool: use correct value for crc32 hash (bsc#1197099 jsc#SLE-24124).\n- net: ena: Fix all static chekers\u0027 warnings (bsc#1197099 jsc#SLE-24124).\n- net: ena: Fix build warning in ena_xdp_set() (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix coding style nits (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix continuous keep-alive resets (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix corruption of dev_idx_to_host_tbl (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix default tx interrupt moderation interval (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1197099 jsc#SLE-24124).\n- net: ena: Fix error handling when calculating max IO queues number (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix error returning in ena_com_get_hash_function() (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix inaccurate print type (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix incorrect default RSS key (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix incorrect setting of the number of msix vectors (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix incorrect update of intr_delay_resolution (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix issues in setting interrupt moderation params in ethtool (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix packet\u0027s addresses for rx_offset feature (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix potential crash when rxfh key is NULL (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix request of incorrect number of IRQ vectors (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix retrieval of nonadaptive interrupt moderation intervals (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix update of interrupt moderation register (bsc#1197099 jsc#SLE-24124).\n- net: ena: fix uses of round_jiffies() (bsc#1197099 jsc#SLE-24124).\n- net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1197099 jsc#SLE-24124).\n- net: ena: Fix wrong rx request id by resetting device (bsc#1197099 jsc#SLE-24124).\n- net: ena: handle bad request id in ena_netdev (bsc#1197099 jsc#SLE-24124).\n- net: ena: Improve error logging in driver (bsc#1197099 jsc#SLE-24124).\n- net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (bsc#1197099 jsc#SLE-24124).\n- net: ena: make ethtool -l show correct max number of queues (bsc#1197099 jsc#SLE-24124).\n- net: ena: Make missed_tx stat incremental (bsc#1197099 jsc#SLE-24124).\n- net: ena: make symbol \u0027ena_alloc_map_page\u0027 static (bsc#1197099 jsc#SLE-24124).\n- net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1197099 jsc#SLE-24124).\n- net: ena: Move reset completion print to the reset function (bsc#1197099 jsc#SLE-24124).\n- net: ena: multiple queue creation related cleanups (bsc#1197099 jsc#SLE-24124).\n- net: ena: Prevent reset after device destruction (bsc#1197099 jsc#SLE-24124).\n- net: ena: re-organize code to improve readability (bsc#1197099 jsc#SLE-24124).\n- net: ena: reduce driver load time (bsc#1197099 jsc#SLE-24124).\n- net: ena: reimplement set/get_coalesce() (bsc#1197099 jsc#SLE-24124).\n- net: ena: remove all old adaptive rx interrupt moderation code from ena_com (bsc#1197099 jsc#SLE-24124).\n- net: ena: remove code duplication in ena_com_update_nonadaptive_moderation_interval _*() (bsc#1197099 jsc#SLE-24124).\n- net: ena: remove code that does nothing (bsc#1197099 jsc#SLE-24124).\n- net: ena: Remove ena_calc_queue_size_ctx struct (bsc#1197099 jsc#SLE-24124).\n- net: ena: remove ena_restore_ethtool_params() and relevant fields (bsc#1197099 jsc#SLE-24124).\n- net: ena: remove extra words from comments (bsc#1197099 jsc#SLE-24124).\n- net: ena: Remove module param and change message severity (bsc#1197099 jsc#SLE-24124).\n- net: ena: remove old adaptive interrupt moderation code from ena_netdev (bsc#1197099 jsc#SLE-24124).\n- net: ena: remove redundant print of number of queues (bsc#1197099 jsc#SLE-24124).\n- net: ena: Remove redundant print of placement policy (bsc#1197099 jsc#SLE-24124).\n- net: ena: Remove redundant return code check (bsc#1197099 jsc#SLE-24124).\n- net: ena: remove set but not used variable \u0027hash_key\u0027 (bsc#1197099 jsc#SLE-24124).\n- net: ena: Remove unused code (bsc#1197099 jsc#SLE-24124).\n- net: ena: rename ena_com_free_desc to make API more uniform (bsc#1197099 jsc#SLE-24124).\n- net: ena: rss: do not allocate key when not supported (bsc#1197099 jsc#SLE-24124).\n- net: ena: rss: fix failure to get indirection table (bsc#1197099 jsc#SLE-24124).\n- net: ena: rss: store hash function as values and not bits (bsc#1197099 jsc#SLE-24124).\n- net: ena: Select DIMLIB for ENA_ETHERNET (bsc#1197099 jsc#SLE-24124).\n- net: ena: set initial DMA width to avoid intel iommu issue (bsc#1197099 jsc#SLE-24124).\n- net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1197099 jsc#SLE-24124).\n- net: ena: store values in their appropriate variables types (bsc#1197099 jsc#SLE-24124).\n- net: ena: support new LLQ acceleration mode (bsc#1197099 jsc#SLE-24124).\n- net: ena: switch to dim algorithm for rx adaptive interrupt moderation (bsc#1197099 jsc#SLE-24124).\n- net: ena: use constant value for net_device allocation (bsc#1197099 jsc#SLE-24124).\n- net: ena: Use dev_alloc() in RX buffer allocation (bsc#1197099 jsc#SLE-24124).\n- net: ena: use explicit variable size for clarity (bsc#1197099 jsc#SLE-24124).\n- net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1197099 jsc#SLE-24124).\n- net: mana: Add counter for packet dropped by XDP (bsc#1195651).\n- net: mana: Add counter for XDP_TX (bsc#1195651).\n- net: mana: Add handling of CQE_RX_TRUNCATED (bsc#1195651).\n- net: mana: Remove unnecessary check of cqe_type in mana_process_rx_cqe() (bsc#1195651).\n- net: mana: Reuse XDP dropped page (bsc#1195651).\n- net: mana: Use struct_size() helper in mana_gd_create_dma_region() (bsc#1195651).\n- net: update net_dim documentation after rename (bsc#1197099 jsc#SLE-24124).\n- PCI: hv: Do not set PCI_COMMAND_MEMORY to reduce VM boot time (bsc#1199314).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900 bsc#1198660 ltc#197803).\n- powerpc/pseries: Fix use after free in remove_phb_dynamic() (bsc#1065729 bsc#1198660 ltc#197803).\n- scsi: scsi_dh_alua: Avoid crash during alua_bus_detach() (bsc#1028340 bsc#1198825).\n- x86/pm: Save the MSR validity status at context setup (bsc#1114648).\n- x86/speculation: Restore speculation related MSRs during S3 resume (bsc#1114648).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-2083,SUSE-OpenStack-Cloud-9-2022-2083,SUSE-OpenStack-Cloud-Crowbar-9-2022-2083,SUSE-SLE-HA-12-SP4-2022-2083,SUSE-SLE-Live-Patching-12-SP4-2022-2083,SUSE-SLE-SAP-12-SP4-2022-2083,SUSE-SLE-SERVER-12-SP4-LTSS-2022-2083",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_2083-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:2083-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20222083-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:2083-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html"
},
{
"category": "self",
"summary": "SUSE Bug 1028340",
"url": "https://bugzilla.suse.com/1028340"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1071995",
"url": "https://bugzilla.suse.com/1071995"
},
{
"category": "self",
"summary": "SUSE Bug 1114648",
"url": "https://bugzilla.suse.com/1114648"
},
{
"category": "self",
"summary": "SUSE Bug 1172456",
"url": "https://bugzilla.suse.com/1172456"
},
{
"category": "self",
"summary": "SUSE Bug 1182171",
"url": "https://bugzilla.suse.com/1182171"
},
{
"category": "self",
"summary": "SUSE Bug 1183723",
"url": "https://bugzilla.suse.com/1183723"
},
{
"category": "self",
"summary": "SUSE Bug 1187055",
"url": "https://bugzilla.suse.com/1187055"
},
{
"category": "self",
"summary": "SUSE Bug 1191647",
"url": "https://bugzilla.suse.com/1191647"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1195651",
"url": "https://bugzilla.suse.com/1195651"
},
{
"category": "self",
"summary": "SUSE Bug 1196426",
"url": "https://bugzilla.suse.com/1196426"
},
{
"category": "self",
"summary": "SUSE Bug 1197099",
"url": "https://bugzilla.suse.com/1197099"
},
{
"category": "self",
"summary": "SUSE Bug 1197219",
"url": "https://bugzilla.suse.com/1197219"
},
{
"category": "self",
"summary": "SUSE Bug 1197343",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "self",
"summary": "SUSE Bug 1198400",
"url": "https://bugzilla.suse.com/1198400"
},
{
"category": "self",
"summary": "SUSE Bug 1198516",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "self",
"summary": "SUSE Bug 1198660",
"url": "https://bugzilla.suse.com/1198660"
},
{
"category": "self",
"summary": "SUSE Bug 1198687",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "self",
"summary": "SUSE Bug 1198742",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "self",
"summary": "SUSE Bug 1198825",
"url": "https://bugzilla.suse.com/1198825"
},
{
"category": "self",
"summary": "SUSE Bug 1199012",
"url": "https://bugzilla.suse.com/1199012"
},
{
"category": "self",
"summary": "SUSE Bug 1199063",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "self",
"summary": "SUSE Bug 1199314",
"url": "https://bugzilla.suse.com/1199314"
},
{
"category": "self",
"summary": "SUSE Bug 1199399",
"url": "https://bugzilla.suse.com/1199399"
},
{
"category": "self",
"summary": "SUSE Bug 1199426",
"url": "https://bugzilla.suse.com/1199426"
},
{
"category": "self",
"summary": "SUSE Bug 1199505",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "self",
"summary": "SUSE Bug 1199605",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "self",
"summary": "SUSE Bug 1199650",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20292 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20321 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20321/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33061 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38208 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38208/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-39711 page",
"url": "https://www.suse.com/security/cve/CVE-2021-39711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1011 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1353 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1353/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1419 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1516 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1652 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1652/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1734 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1734/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21123 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21123/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21125 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21125/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21127 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21127/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21166 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21166/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-21180 page",
"url": "https://www.suse.com/security/cve/CVE-2022-21180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-30594 page",
"url": "https://www.suse.com/security/cve/CVE-2022-30594/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2022-06-14T20:15:54Z",
"generator": {
"date": "2022-06-14T20:15:54Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:2083-1",
"initial_release_date": "2022-06-14T20:15:54Z",
"revision_history": [
{
"date": "2022-06-14T20:15:54Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.99.3.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.99.3.aarch64",
"product_id": "cluster-md-kmp-default-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.99.3.aarch64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.99.3.aarch64",
"product_id": "dlm-kmp-default-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.99.3.aarch64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.99.3.aarch64",
"product_id": "gfs2-kmp-default-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-default-4.12.14-95.99.3.aarch64",
"product_id": "kernel-default-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-default-base-4.12.14-95.99.3.aarch64",
"product_id": "kernel-default-base-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-default-devel-4.12.14-95.99.3.aarch64",
"product_id": "kernel-default-devel-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-default-extra-4.12.14-95.99.3.aarch64",
"product_id": "kernel-default-extra-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.99.3.aarch64",
"product_id": "kernel-default-kgraft-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.aarch64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-obs-build-4.12.14-95.99.3.aarch64",
"product_id": "kernel-obs-build-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.99.3.aarch64",
"product_id": "kernel-obs-qa-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.99.2.aarch64",
"product": {
"name": "kernel-syms-4.12.14-95.99.2.aarch64",
"product_id": "kernel-syms-4.12.14-95.99.2.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-vanilla-4.12.14-95.99.3.aarch64",
"product_id": "kernel-vanilla-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.99.3.aarch64",
"product_id": "kernel-vanilla-base-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.99.3.aarch64",
"product_id": "kernel-vanilla-devel-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.aarch64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.aarch64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.99.3.aarch64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.99.3.aarch64",
"product_id": "kselftests-kmp-default-4.12.14-95.99.3.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.99.3.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.99.3.aarch64",
"product_id": "ocfs2-kmp-default-4.12.14-95.99.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.12.14-95.99.2.noarch",
"product": {
"name": "kernel-devel-4.12.14-95.99.2.noarch",
"product_id": "kernel-devel-4.12.14-95.99.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.12.14-95.99.2.noarch",
"product": {
"name": "kernel-docs-4.12.14-95.99.2.noarch",
"product_id": "kernel-docs-4.12.14-95.99.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.12.14-95.99.2.noarch",
"product": {
"name": "kernel-docs-html-4.12.14-95.99.2.noarch",
"product_id": "kernel-docs-html-4.12.14-95.99.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.12.14-95.99.2.noarch",
"product": {
"name": "kernel-macros-4.12.14-95.99.2.noarch",
"product_id": "kernel-macros-4.12.14-95.99.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.12.14-95.99.2.noarch",
"product": {
"name": "kernel-source-4.12.14-95.99.2.noarch",
"product_id": "kernel-source-4.12.14-95.99.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.12.14-95.99.2.noarch",
"product": {
"name": "kernel-source-vanilla-4.12.14-95.99.2.noarch",
"product_id": "kernel-source-vanilla-4.12.14-95.99.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"product_id": "cluster-md-kmp-default-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"product": {
"name": "dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"product_id": "dlm-kmp-default-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"product_id": "gfs2-kmp-default-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-debug-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-debug-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-debug-base-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-debug-base-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-debug-devel-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-debug-devel-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-default-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-default-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-default-base-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-default-base-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-default-devel-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-default-devel-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-default-extra-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-default-extra-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-default-kgraft-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-obs-build-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-obs-build-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-obs-qa-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-obs-qa-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.99.2.ppc64le",
"product": {
"name": "kernel-syms-4.12.14-95.99.2.ppc64le",
"product_id": "kernel-syms-4.12.14-95.99.2.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-vanilla-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-vanilla-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-vanilla-base-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-vanilla-devel-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.ppc64le",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"product": {
"name": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"product_id": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.99.3.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.99.3.ppc64le",
"product_id": "kselftests-kmp-default-4.12.14-95.99.3.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"product_id": "ocfs2-kmp-default-4.12.14-95.99.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"product_id": "cluster-md-kmp-default-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.99.3.s390x",
"product": {
"name": "dlm-kmp-default-4.12.14-95.99.3.s390x",
"product_id": "dlm-kmp-default-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.99.3.s390x",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.99.3.s390x",
"product_id": "gfs2-kmp-default-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-default-4.12.14-95.99.3.s390x",
"product_id": "kernel-default-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-default-base-4.12.14-95.99.3.s390x",
"product_id": "kernel-default-base-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-default-devel-4.12.14-95.99.3.s390x",
"product_id": "kernel-default-devel-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-default-extra-4.12.14-95.99.3.s390x",
"product_id": "kernel-default-extra-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.99.3.s390x",
"product_id": "kernel-default-kgraft-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-default-man-4.12.14-95.99.3.s390x",
"product_id": "kernel-default-man-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-obs-build-4.12.14-95.99.3.s390x",
"product_id": "kernel-obs-build-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-obs-qa-4.12.14-95.99.3.s390x",
"product_id": "kernel-obs-qa-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.99.2.s390x",
"product": {
"name": "kernel-syms-4.12.14-95.99.2.s390x",
"product_id": "kernel-syms-4.12.14-95.99.2.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-vanilla-4.12.14-95.99.3.s390x",
"product_id": "kernel-vanilla-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.99.3.s390x",
"product_id": "kernel-vanilla-base-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.99.3.s390x",
"product_id": "kernel-vanilla-devel-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.s390x",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-zfcpdump-4.12.14-95.99.3.s390x",
"product_id": "kernel-zfcpdump-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-man-4.12.14-95.99.3.s390x",
"product": {
"name": "kernel-zfcpdump-man-4.12.14-95.99.3.s390x",
"product_id": "kernel-zfcpdump-man-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"product": {
"name": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"product_id": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.99.3.s390x",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.99.3.s390x",
"product_id": "kselftests-kmp-default-4.12.14-95.99.3.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"product_id": "ocfs2-kmp-default-4.12.14-95.99.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"product_id": "cluster-md-kmp-default-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.12.14-95.99.3.x86_64",
"product": {
"name": "dlm-kmp-default-4.12.14-95.99.3.x86_64",
"product_id": "dlm-kmp-default-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"product": {
"name": "gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"product_id": "gfs2-kmp-default-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-debug-4.12.14-95.99.3.x86_64",
"product_id": "kernel-debug-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-debug-base-4.12.14-95.99.3.x86_64",
"product_id": "kernel-debug-base-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-debug-devel-4.12.14-95.99.3.x86_64",
"product_id": "kernel-debug-devel-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-devel-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-debug-kgraft-devel-4.12.14-95.99.3.x86_64",
"product_id": "kernel-debug-kgraft-devel-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-default-4.12.14-95.99.3.x86_64",
"product_id": "kernel-default-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-default-base-4.12.14-95.99.3.x86_64",
"product_id": "kernel-default-base-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-default-devel-4.12.14-95.99.3.x86_64",
"product_id": "kernel-default-devel-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-default-extra-4.12.14-95.99.3.x86_64",
"product_id": "kernel-default-extra-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"product_id": "kernel-default-kgraft-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"product_id": "kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-kvmsmall-4.12.14-95.99.3.x86_64",
"product_id": "kernel-kvmsmall-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-base-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-kvmsmall-base-4.12.14-95.99.3.x86_64",
"product_id": "kernel-kvmsmall-base-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-4.12.14-95.99.3.x86_64",
"product_id": "kernel-kvmsmall-devel-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-kvmsmall-kgraft-devel-4.12.14-95.99.3.x86_64",
"product_id": "kernel-kvmsmall-kgraft-devel-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-obs-build-4.12.14-95.99.3.x86_64",
"product_id": "kernel-obs-build-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-obs-qa-4.12.14-95.99.3.x86_64",
"product_id": "kernel-obs-qa-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.12.14-95.99.2.x86_64",
"product": {
"name": "kernel-syms-4.12.14-95.99.2.x86_64",
"product_id": "kernel-syms-4.12.14-95.99.2.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-vanilla-4.12.14-95.99.3.x86_64",
"product_id": "kernel-vanilla-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-vanilla-base-4.12.14-95.99.3.x86_64",
"product_id": "kernel-vanilla-base-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.12.14-95.99.3.x86_64",
"product_id": "kernel-vanilla-devel-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.x86_64",
"product": {
"name": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.x86_64",
"product_id": "kernel-vanilla-kgraft-devel-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"product": {
"name": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"product_id": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.12.14-95.99.3.x86_64",
"product": {
"name": "kselftests-kmp-default-4.12.14-95.99.3.x86_64",
"product_id": "kselftests-kmp-default-4.12.14-95.99.3.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"product_id": "ocfs2-kmp-default-4.12.14-95.99.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-live-patching:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.99.3.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.99.3.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.99.3.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.99.2.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.99.2.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.99.2.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-source-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.99.2.x86_64 as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.99.2.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.99.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.99.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.99.3.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.99.2.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.99.2.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.99.2.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-source-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.99.2.x86_64 as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.99.2.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.99.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le"
},
"product_reference": "dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.99.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x"
},
"product_reference": "dlm-kmp-default-4.12.14-95.99.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64"
},
"product_reference": "dlm-kmp-default-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.99.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.99.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64"
},
"product_reference": "gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.99.3.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP4",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.99.3.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.99.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le"
},
"product_reference": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x"
},
"product_reference": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP4",
"product_id": "SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64"
},
"product_reference": "kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.99.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.99.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.99.2.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-source-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.99.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.99.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.99.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.99.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.99.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64"
},
"product_reference": "kernel-default-4.12.14-95.99.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le"
},
"product_reference": "kernel-default-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.99.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x"
},
"product_reference": "kernel-default-4.12.14-95.99.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.99.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64"
},
"product_reference": "kernel-default-base-4.12.14-95.99.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le"
},
"product_reference": "kernel-default-base-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.99.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x"
},
"product_reference": "kernel-default-base-4.12.14-95.99.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-base-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.99.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64"
},
"product_reference": "kernel-default-devel-4.12.14-95.99.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.99.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le"
},
"product_reference": "kernel-default-devel-4.12.14-95.99.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.99.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x"
},
"product_reference": "kernel-default-devel-4.12.14-95.99.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.12.14-95.99.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64"
},
"product_reference": "kernel-default-devel-4.12.14-95.99.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.12.14-95.99.3.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x"
},
"product_reference": "kernel-default-man-4.12.14-95.99.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.12.14-95.99.2.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-devel-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.12.14-95.99.2.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-macros-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.12.14-95.99.2.noarch as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch"
},
"product_reference": "kernel-source-4.12.14-95.99.2.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.99.2.aarch64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64"
},
"product_reference": "kernel-syms-4.12.14-95.99.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.99.2.ppc64le as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le"
},
"product_reference": "kernel-syms-4.12.14-95.99.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.99.2.s390x as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x"
},
"product_reference": "kernel-syms-4.12.14-95.99.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.12.14-95.99.2.x86_64 as component of SUSE Linux Enterprise Server 12 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64"
},
"product_reference": "kernel-syms-4.12.14-95.99.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-20811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20811"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.0.6. In rx_queue_add_kobject() and netdev_queue_add_kobject() in net/core/net-sysfs.c, a reference count is mishandled, aka CID-a3e23f719f5c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20811",
"url": "https://www.suse.com/security/cve/CVE-2019-20811"
},
{
"category": "external",
"summary": "SUSE Bug 1172456 for CVE-2019-20811",
"url": "https://bugzilla.suse.com/1172456"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2019-20811"
},
{
"cve": "CVE-2021-20292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20292"
}
],
"notes": [
{
"category": "general",
"text": "There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20292",
"url": "https://www.suse.com/security/cve/CVE-2021-20292"
},
{
"category": "external",
"summary": "SUSE Bug 1183723 for CVE-2021-20292",
"url": "https://bugzilla.suse.com/1183723"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-20292"
},
{
"cve": "CVE-2021-20321",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20321"
}
],
"notes": [
{
"category": "general",
"text": "A race condition accessing file object in the Linux kernel OverlayFS subsystem was found in the way users do rename in specific way with OverlayFS. A local user could use this flaw to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20321",
"url": "https://www.suse.com/security/cve/CVE-2021-20321"
},
{
"category": "external",
"summary": "SUSE Bug 1191647 for CVE-2021-20321",
"url": "https://bugzilla.suse.com/1191647"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-20321"
},
{
"cve": "CVE-2021-33061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33061"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient control flow management for the Intel(R) 82599 Ethernet Controllers and Adapters may allow an authenticated user to potentially enable denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33061",
"url": "https://www.suse.com/security/cve/CVE-2021-33061"
},
{
"category": "external",
"summary": "SUSE Bug 1196426 for CVE-2021-33061",
"url": "https://bugzilla.suse.com/1196426"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-33061"
},
{
"cve": "CVE-2021-38208",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38208"
}
],
"notes": [
{
"category": "general",
"text": "net/nfc/llcp_sock.c in the Linux kernel before 5.12.10 allows local unprivileged users to cause a denial of service (NULL pointer dereference and BUG) by making a getsockname call after a certain type of failure of a bind call.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38208",
"url": "https://www.suse.com/security/cve/CVE-2021-38208"
},
{
"category": "external",
"summary": "SUSE Bug 1187055 for CVE-2021-38208",
"url": "https://bugzilla.suse.com/1187055"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-38208"
},
{
"cve": "CVE-2021-39711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-39711"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_prog_test_run_skb of test_run.c, there is a possible out of bounds read due to Incorrect Size Value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154175781References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-39711",
"url": "https://www.suse.com/security/cve/CVE-2021-39711"
},
{
"category": "external",
"summary": "SUSE Bug 1197219 for CVE-2021-39711",
"url": "https://bugzilla.suse.com/1197219"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-39711"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
},
{
"cve": "CVE-2022-1011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1011"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1011",
"url": "https://www.suse.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "SUSE Bug 1197343 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197343"
},
{
"category": "external",
"summary": "SUSE Bug 1197344 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1197344"
},
{
"category": "external",
"summary": "SUSE Bug 1198687 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1198687"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212322 for CVE-2022-1011",
"url": "https://bugzilla.suse.com/1212322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-1011"
},
{
"cve": "CVE-2022-1353",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1353"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1353",
"url": "https://www.suse.com/security/cve/CVE-2022-1353"
},
{
"category": "external",
"summary": "SUSE Bug 1198516 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1198516"
},
{
"category": "external",
"summary": "SUSE Bug 1212293 for CVE-2022-1353",
"url": "https://bugzilla.suse.com/1212293"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-1353"
},
{
"cve": "CVE-2022-1419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1419"
}
],
"notes": [
{
"category": "general",
"text": "The root cause of this vulnerability is that the ioctl$DRM_IOCTL_MODE_DESTROY_DUMB can decrease refcount of *drm_vgem_gem_object *(created in *vgem_gem_dumb_create*) concurrently, and *vgem_gem_dumb_create *will access the freed drm_vgem_gem_object.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1419",
"url": "https://www.suse.com/security/cve/CVE-2022-1419"
},
{
"category": "external",
"summary": "SUSE Bug 1198742 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1198742"
},
{
"category": "external",
"summary": "SUSE Bug 1201655 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1201655"
},
{
"category": "external",
"summary": "SUSE Bug 1203034 for CVE-2022-1419",
"url": "https://bugzilla.suse.com/1203034"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-1419"
},
{
"cve": "CVE-2022-1516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1516"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1516",
"url": "https://www.suse.com/security/cve/CVE-2022-1516"
},
{
"category": "external",
"summary": "SUSE Bug 1199012 for CVE-2022-1516",
"url": "https://bugzilla.suse.com/1199012"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-1516"
},
{
"cve": "CVE-2022-1652",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1652"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel could allow a local attacker to execute arbitrary code on the system, caused by a concurrency use-after-free flaw in the bad_flp_intr function. By executing a specially-crafted program, an attacker could exploit this vulnerability to execute arbitrary code or cause a denial of service condition on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1652",
"url": "https://www.suse.com/security/cve/CVE-2022-1652"
},
{
"category": "external",
"summary": "SUSE Bug 1199063 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1199063"
},
{
"category": "external",
"summary": "SUSE Bug 1200057 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200057"
},
{
"category": "external",
"summary": "SUSE Bug 1200751 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1200751"
},
{
"category": "external",
"summary": "SUSE Bug 1201034 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201034"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1201832"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1204132"
},
{
"category": "external",
"summary": "SUSE Bug 1212307 for CVE-2022-1652",
"url": "https://bugzilla.suse.com/1212307"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-1652"
},
{
"cve": "CVE-2022-1734",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1734"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in Linux Kernel found in nfcmrvl_nci_unregister_dev() in drivers/nfc/nfcmrvl/main.c can lead to use after free both read or write when non synchronized between cleanup routine and firmware download routine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1734",
"url": "https://www.suse.com/security/cve/CVE-2022-1734"
},
{
"category": "external",
"summary": "SUSE Bug 1199605 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199605"
},
{
"category": "external",
"summary": "SUSE Bug 1199606 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1199606"
},
{
"category": "external",
"summary": "SUSE Bug 1201832 for CVE-2022-1734",
"url": "https://bugzilla.suse.com/1201832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "important"
}
],
"title": "CVE-2022-1734"
},
{
"cve": "CVE-2022-21123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21123"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of multi-core shared buffers for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21123",
"url": "https://www.suse.com/security/cve/CVE-2022-21123"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209075 for CVE-2022-21123",
"url": "https://bugzilla.suse.com/1209075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21125"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup of microarchitectural fill buffers on some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21125",
"url": "https://www.suse.com/security/cve/CVE-2022-21125"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209074 for CVE-2022-21125",
"url": "https://bugzilla.suse.com/1209074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21127",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21127"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register read operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21127",
"url": "https://www.suse.com/security/cve/CVE-2022-21127"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21127",
"url": "https://bugzilla.suse.com/1200549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-21127"
},
{
"cve": "CVE-2022-21166",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21166"
}
],
"notes": [
{
"category": "general",
"text": "Incomplete cleanup in specific special register write operations for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21166",
"url": "https://www.suse.com/security/cve/CVE-2022-21166"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1209073 for CVE-2022-21166",
"url": "https://bugzilla.suse.com/1209073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-21180"
}
],
"notes": [
{
"category": "general",
"text": "Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-21180",
"url": "https://www.suse.com/security/cve/CVE-2022-21180"
},
{
"category": "external",
"summary": "SUSE Bug 1199650 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1199650"
},
{
"category": "external",
"summary": "SUSE Bug 1200549 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1200549"
},
{
"category": "external",
"summary": "SUSE Bug 1212313 for CVE-2022-21180",
"url": "https://bugzilla.suse.com/1212313"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "moderate"
}
],
"title": "CVE-2022-21180"
},
{
"cve": "CVE-2022-30594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-30594"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.17.2 mishandles seccomp permissions. The PTRACE_SEIZE code path allows attackers to bypass intended restrictions on setting the PT_SUSPEND_SECCOMP flag.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-30594",
"url": "https://www.suse.com/security/cve/CVE-2022-30594"
},
{
"category": "external",
"summary": "SUSE Bug 1199505 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199505"
},
{
"category": "external",
"summary": "SUSE Bug 1199602 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1199602"
},
{
"category": "external",
"summary": "SUSE Bug 1201549 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1201549"
},
{
"category": "external",
"summary": "SUSE Bug 1204132 for CVE-2022-30594",
"url": "https://bugzilla.suse.com/1204132"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:cluster-md-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:dlm-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:gfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP4:ocfs2-kmp-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kernel-default-kgraft-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.ppc64le",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.s390x",
"SUSE Linux Enterprise Live Patching 12 SP4:kgraft-patch-4_12_14-95_99-default-1-6.3.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-default-man-4.12.14-95.99.3.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.aarch64",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.s390x",
"SUSE Linux Enterprise Server 12 SP4-LTSS:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-source-4.12.14-95.99.2.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud 9:kernel-syms-4.12.14-95.99.2.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-base-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-default-devel-4.12.14-95.99.3.x86_64",
"SUSE OpenStack Cloud Crowbar 9:kernel-devel-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-macros-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-source-4.12.14-95.99.2.noarch",
"SUSE OpenStack Cloud Crowbar 9:kernel-syms-4.12.14-95.99.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-06-14T20:15:54Z",
"details": "important"
}
],
"title": "CVE-2022-30594"
}
]
}
suse-su-2021:3935-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 12 SP3 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2020-12655: An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767 (bnc#1171217).\n- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n- CVE-2021-34556: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack (bnc#1188983).\n- CVE-2021-35477: An unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation did not necessarily occur before a store operation that has an attacker-controlled value (bnc#1188985).\n- CVE-2017-17862: kernel/bpf/verifier.c in the Linux kernel ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service (bnc#1073928).\n- CVE-2017-17864: kernel/bpf/verifier.c in the Linux kernel mishandled states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allowed local users to obtain potentially sensitive address information, aka a \u0027pointer leak (bnc#1073928).\n- CVE-2021-20265: A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allowed an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability (bnc#1183089).\n- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).\n- CVE-2021-3655: Missing size validations on inbound SCTP packets may have allowed the kernel to read uninitialized memory (bnc#1188563).\n- CVE-2018-13405: The inode_init_owner function in fs/inode.c in the Linux kernel allowed local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID (bnc#1100416 bnc#1129735).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-42739: The firewire subsystem in the Linux kernel has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bnc#1184673).\n- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).\n- CVE-2021-33033: The Linux kernel has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value (bnc#1186109 bnc#1186390 bnc#1188876).\n- CVE-2020-14305: An out-of-bounds memory write flaw was found in how the Linux kernel\u0026#8217;s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allowed an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability (bnc#1173346).\n- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).\n- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).\n- CVE-2021-42008: The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access (bnc#1191315).\n- CVE-2020-3702: Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic (bnc#1191193).\n- CVE-2021-3752: Fixed a use after free vulnerability in the Linux kernel\u0027s bluetooth module. (bsc#1190023)\n- CVE-2021-40490: A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel (bnc#1190159 bnc#1192775)\n- CVE-2021-3640: Fixed a Use-After-Free vulnerability in function sco_sock_sendmsg() in the bluetooth stack (bsc#1188172).\n- CVE-2021-38160: Data corruption or loss could be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size in drivers/char/virtio_console.c (bsc#1190117)\n- CVE-2021-3753: Fixed race out-of-bounds in virtual terminal handling (bsc#1190025).\n- CVE-2021-3732: Mounting overlayfs inside an unprivileged user namespace can reveal files (bsc#1189706).\n- CVE-2021-3653: A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \u0027int_ctl\u0027 field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7 (bnc#1189399 bnc#1189420).\n- CVE-2021-38198: arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault (bnc#1189262 bnc#1189278).\n- CVE-2021-38204: drivers/usb/host/max3421-hcd.c in the Linux kernel allowed physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations (bnc#1189291).\n- CVE-2021-3679: A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service (bnc#1189057).\n- CVE-2018-16882: A use-after-free issue was found in the way the Linux kernel\u0027s KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the \u0027pi_desc_page\u0027 without resetting \u0027pi_desc\u0027 descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions and are vulnerable (bnc#1119934).\n- CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1176724).\n- CVE-2020-4788: IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296 (bnc#1177666 bnc#1181158).\n- CVE-2021-3659: Fixed a NULL pointer dereference in llsec_key_alloc() in net/mac802154/llsec.c (bsc#1188876).\n- CVE-2021-37576: arch/powerpc/kvm/book3s_rtas.c in the Linux kernel on the powerpc platform allowed KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e (bnc#1188838).\n\nThe following non-security bugs were fixed:\n\n- PCI: hv: Use expected affinity when unmasking IRQ (bsc#1185973).\n- SUNRPC: improve error response to over-size gss credential (bsc#1190022).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- blacklist.conf: Drop a line that was added by mistake\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22918)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22918).\n- bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425).\n- config: disable unprivileged BPF by default (jsc#SLE-22918)\n- cpufreq: intel_pstate: Add Icelake servers support in no-HWP mode (bsc#1185758,bsc#1192400).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- hv: mana: adjust mana_select_queue to old API (jsc#SLE-18779, bsc#1185727).\n- hv: mana: declare vzalloc (jsc#SLE-18779, bsc#1185726).\n- hv: mana: fake bitmap API (jsc#SLE-18779, bsc#1185726).\n- hv: mana: remove netdev_lockdep_set_classes usage (jsc#SLE-18779, bsc#1185727).\n- kABI: protect struct bpf_map (kabi).\n- mm: replace open coded page to virt conversion with page_to_virt() (jsc#SLE-18779, bsc#1185727).\n- net/mlx4_en: Avoid scheduling restart task if it is already running (bsc#1181854 bsc#1181855).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854 bsc#1181855).\n- net: mana: Add WARN_ON_ONCE in case of CQE read overflow (jsc#SLE-18779, bsc#1185727).\n- net: mana: Add a driver for Microsoft Azure Network Adapter (MANA) (jsc#SLE-18779, bsc#1185727).\n- net: mana: Add support for EQ sharing (jsc#SLE-18779, bsc#1185727).\n- net: mana: Fix a memory leak in an error handling path in (jsc#SLE-18779, bsc#1185727).\n- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191801).\n- net: mana: Move NAPI from EQ to CQ (jsc#SLE-18779, bsc#1185727).\n- net: mana: Use int to check the return value of mana_gd_poll_cq() (jsc#SLE-18779, bsc#1185727).\n- net: mana: fix PCI_HYPERV dependency (jsc#SLE-18779, bsc#1185727).\n- net: mana: remove redundant initialization of variable err (jsc#SLE-18779, bsc#1185727).\n- net: sched: sch_teql: fix null-pointer dereference (bsc#1190717).\n- s390/bpf: Fix 64-bit subtraction of the -0x80000000 constant (bsc#1190601).\n- s390/bpf: Fix branch shortening during codegen pass (bsc#1190601).\n- s390/bpf: Fix optimizing out zero-extensions (bsc#1190601).\n- s390/bpf: Wrap JIT macro parameter usages in parentheses (bsc#1190601).\n- s390: bpf: implement jitting of BPF_ALU | BPF_ARSH | BPF_* (bsc#1190601).\n- scsi: sg: add sg_remove_request in sg_write (bsc#1171420 CVE2020-12770).\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- sctp: fully initialize v4 addr in some functions (bsc#1188563).\n- sctp: simplify addr copy (bsc#1188563).\n- x86/CPU: Add more Icelake model numbers (bsc#1185758,bsc#1192400).\n- x86/tlb: Flush global mappings when KAISER is disabled (bsc#1190194).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2021-3935,SUSE-2021-3935,SUSE-OpenStack-Cloud-8-2021-3935,SUSE-OpenStack-Cloud-Crowbar-8-2021-3935,SUSE-SLE-HA-12-SP3-2021-3935,SUSE-SLE-SAP-12-SP3-2021-3935,SUSE-SLE-SERVER-12-SP3-2021-3935,SUSE-SLE-SERVER-12-SP3-BCL-2021-3935",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3935-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3935-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213935-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3935-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html"
},
{
"category": "self",
"summary": "SUSE Bug 1073928",
"url": "https://bugzilla.suse.com/1073928"
},
{
"category": "self",
"summary": "SUSE Bug 1098425",
"url": "https://bugzilla.suse.com/1098425"
},
{
"category": "self",
"summary": "SUSE Bug 1100416",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "self",
"summary": "SUSE Bug 1119934",
"url": "https://bugzilla.suse.com/1119934"
},
{
"category": "self",
"summary": "SUSE Bug 1129735",
"url": "https://bugzilla.suse.com/1129735"
},
{
"category": "self",
"summary": "SUSE Bug 1171217",
"url": "https://bugzilla.suse.com/1171217"
},
{
"category": "self",
"summary": "SUSE Bug 1171420",
"url": "https://bugzilla.suse.com/1171420"
},
{
"category": "self",
"summary": "SUSE Bug 1173346",
"url": "https://bugzilla.suse.com/1173346"
},
{
"category": "self",
"summary": "SUSE Bug 1176724",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "self",
"summary": "SUSE Bug 1177666",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "self",
"summary": "SUSE Bug 1181158",
"url": "https://bugzilla.suse.com/1181158"
},
{
"category": "self",
"summary": "SUSE Bug 1181854",
"url": "https://bugzilla.suse.com/1181854"
},
{
"category": "self",
"summary": "SUSE Bug 1181855",
"url": "https://bugzilla.suse.com/1181855"
},
{
"category": "self",
"summary": "SUSE Bug 1183089",
"url": "https://bugzilla.suse.com/1183089"
},
{
"category": "self",
"summary": "SUSE Bug 1184673",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "self",
"summary": "SUSE Bug 1185726",
"url": "https://bugzilla.suse.com/1185726"
},
{
"category": "self",
"summary": "SUSE Bug 1185727",
"url": "https://bugzilla.suse.com/1185727"
},
{
"category": "self",
"summary": "SUSE Bug 1185758",
"url": "https://bugzilla.suse.com/1185758"
},
{
"category": "self",
"summary": "SUSE Bug 1185973",
"url": "https://bugzilla.suse.com/1185973"
},
{
"category": "self",
"summary": "SUSE Bug 1186109",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "self",
"summary": "SUSE Bug 1186390",
"url": "https://bugzilla.suse.com/1186390"
},
{
"category": "self",
"summary": "SUSE Bug 1188172",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "self",
"summary": "SUSE Bug 1188563",
"url": "https://bugzilla.suse.com/1188563"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1188838",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "self",
"summary": "SUSE Bug 1188876",
"url": "https://bugzilla.suse.com/1188876"
},
{
"category": "self",
"summary": "SUSE Bug 1188983",
"url": "https://bugzilla.suse.com/1188983"
},
{
"category": "self",
"summary": "SUSE Bug 1188985",
"url": "https://bugzilla.suse.com/1188985"
},
{
"category": "self",
"summary": "SUSE Bug 1189057",
"url": "https://bugzilla.suse.com/1189057"
},
{
"category": "self",
"summary": "SUSE Bug 1189262",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "self",
"summary": "SUSE Bug 1189278",
"url": "https://bugzilla.suse.com/1189278"
},
{
"category": "self",
"summary": "SUSE Bug 1189291",
"url": "https://bugzilla.suse.com/1189291"
},
{
"category": "self",
"summary": "SUSE Bug 1189399",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "self",
"summary": "SUSE Bug 1189420",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "self",
"summary": "SUSE Bug 1189706",
"url": "https://bugzilla.suse.com/1189706"
},
{
"category": "self",
"summary": "SUSE Bug 1190022",
"url": "https://bugzilla.suse.com/1190022"
},
{
"category": "self",
"summary": "SUSE Bug 1190023",
"url": "https://bugzilla.suse.com/1190023"
},
{
"category": "self",
"summary": "SUSE Bug 1190025",
"url": "https://bugzilla.suse.com/1190025"
},
{
"category": "self",
"summary": "SUSE Bug 1190067",
"url": "https://bugzilla.suse.com/1190067"
},
{
"category": "self",
"summary": "SUSE Bug 1190117",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "self",
"summary": "SUSE Bug 1190159",
"url": "https://bugzilla.suse.com/1190159"
},
{
"category": "self",
"summary": "SUSE Bug 1190194",
"url": "https://bugzilla.suse.com/1190194"
},
{
"category": "self",
"summary": "SUSE Bug 1190349",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "self",
"summary": "SUSE Bug 1190351",
"url": "https://bugzilla.suse.com/1190351"
},
{
"category": "self",
"summary": "SUSE Bug 1190601",
"url": "https://bugzilla.suse.com/1190601"
},
{
"category": "self",
"summary": "SUSE Bug 1190717",
"url": "https://bugzilla.suse.com/1190717"
},
{
"category": "self",
"summary": "SUSE Bug 1191193",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "self",
"summary": "SUSE Bug 1191315",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191801",
"url": "https://bugzilla.suse.com/1191801"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 1192400",
"url": "https://bugzilla.suse.com/1192400"
},
{
"category": "self",
"summary": "SUSE Bug 1192775",
"url": "https://bugzilla.suse.com/1192775"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17862 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17862/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-17864 page",
"url": "https://www.suse.com/security/cve/CVE-2017-17864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-13405 page",
"url": "https://www.suse.com/security/cve/CVE-2018-13405/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16882 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-0429 page",
"url": "https://www.suse.com/security/cve/CVE-2020-0429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12655 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-14305 page",
"url": "https://www.suse.com/security/cve/CVE-2020-14305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-3702 page",
"url": "https://www.suse.com/security/cve/CVE-2020-3702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-4788 page",
"url": "https://www.suse.com/security/cve/CVE-2020-4788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20265 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20265/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33033 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34556 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-35477 page",
"url": "https://www.suse.com/security/cve/CVE-2021-35477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3640 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3640/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3653 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3653/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3655 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3659 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3659/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3679 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3679/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3715 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3732 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3752 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3753 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37576 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3760 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3772 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38160 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38160/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38198 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38198/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38204 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3896 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-40490 page",
"url": "https://www.suse.com/security/cve/CVE-2021-40490/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42008 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-12-06T12:28:40Z",
"generator": {
"date": "2021-12-06T12:28:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3935-1",
"initial_release_date": "2021-12-06T12:28:40Z",
"revision_history": [
{
"date": "2021-12-06T12:28:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.150.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.150.1.aarch64",
"product_id": "cluster-md-kmp-default-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.150.1.aarch64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.150.1.aarch64",
"product_id": "dlm-kmp-default-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.150.1.aarch64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.150.1.aarch64",
"product_id": "gfs2-kmp-default-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-default-4.4.180-94.150.1.aarch64",
"product_id": "kernel-default-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-default-base-4.4.180-94.150.1.aarch64",
"product_id": "kernel-default-base-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-default-devel-4.4.180-94.150.1.aarch64",
"product_id": "kernel-default-devel-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-default-extra-4.4.180-94.150.1.aarch64",
"product_id": "kernel-default-extra-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.aarch64",
"product_id": "kernel-default-kgraft-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-obs-build-4.4.180-94.150.1.aarch64",
"product_id": "kernel-obs-build-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.150.1.aarch64",
"product_id": "kernel-obs-qa-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-syms-4.4.180-94.150.1.aarch64",
"product_id": "kernel-syms-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-vanilla-4.4.180-94.150.1.aarch64",
"product_id": "kernel-vanilla-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.150.1.aarch64",
"product_id": "kernel-vanilla-base-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.150.1.aarch64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.150.1.aarch64",
"product_id": "kernel-vanilla-devel-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.150.1.aarch64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.150.1.aarch64",
"product_id": "kselftests-kmp-default-4.4.180-94.150.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.150.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.150.1.aarch64",
"product_id": "ocfs2-kmp-default-4.4.180-94.150.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-4.4.180-94.150.1.noarch",
"product": {
"name": "kernel-devel-4.4.180-94.150.1.noarch",
"product_id": "kernel-devel-4.4.180-94.150.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-4.4.180-94.150.1.noarch",
"product": {
"name": "kernel-macros-4.4.180-94.150.1.noarch",
"product_id": "kernel-macros-4.4.180-94.150.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-4.4.180-94.150.1.noarch",
"product": {
"name": "kernel-source-4.4.180-94.150.1.noarch",
"product_id": "kernel-source-4.4.180-94.150.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-4.4.180-94.150.2.noarch",
"product": {
"name": "kernel-docs-4.4.180-94.150.2.noarch",
"product_id": "kernel-docs-4.4.180-94.150.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-4.4.180-94.150.2.noarch",
"product": {
"name": "kernel-docs-html-4.4.180-94.150.2.noarch",
"product_id": "kernel-docs-html-4.4.180-94.150.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-pdf-4.4.180-94.150.2.noarch",
"product": {
"name": "kernel-docs-pdf-4.4.180-94.150.2.noarch",
"product_id": "kernel-docs-pdf-4.4.180-94.150.2.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-4.4.180-94.150.1.noarch",
"product": {
"name": "kernel-source-vanilla-4.4.180-94.150.1.noarch",
"product_id": "kernel-source-vanilla-4.4.180-94.150.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.150.1.ppc64le",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.150.1.ppc64le",
"product_id": "cluster-md-kmp-debug-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"product_id": "cluster-md-kmp-default-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.150.1.ppc64le",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.150.1.ppc64le",
"product_id": "dlm-kmp-debug-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"product": {
"name": "dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"product_id": "dlm-kmp-default-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.150.1.ppc64le",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.150.1.ppc64le",
"product_id": "gfs2-kmp-debug-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"product_id": "gfs2-kmp-default-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-debug-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-debug-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-debug-base-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-debug-base-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-debug-devel-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-debug-devel-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-debug-extra-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-debug-extra-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-debug-kgraft-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-default-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-default-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-default-base-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-default-base-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-default-devel-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-default-devel-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-default-extra-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-default-extra-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-default-kgraft-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-obs-build-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-obs-build-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-obs-qa-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-obs-qa-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-syms-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-syms-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-vanilla-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-vanilla-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-vanilla-base-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.150.1.ppc64le",
"product_id": "kernel-vanilla-devel-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"product": {
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"product_id": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.150.1.ppc64le",
"product_id": "kselftests-kmp-debug-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.150.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.150.1.ppc64le",
"product_id": "kselftests-kmp-default-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.150.1.ppc64le",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.150.1.ppc64le",
"product_id": "ocfs2-kmp-debug-4.4.180-94.150.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"product_id": "ocfs2-kmp-default-4.4.180-94.150.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"product_id": "cluster-md-kmp-default-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.150.1.s390x",
"product": {
"name": "dlm-kmp-default-4.4.180-94.150.1.s390x",
"product_id": "dlm-kmp-default-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.150.1.s390x",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.150.1.s390x",
"product_id": "gfs2-kmp-default-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-default-4.4.180-94.150.1.s390x",
"product_id": "kernel-default-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-default-base-4.4.180-94.150.1.s390x",
"product_id": "kernel-default-base-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-default-devel-4.4.180-94.150.1.s390x",
"product_id": "kernel-default-devel-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-default-extra-4.4.180-94.150.1.s390x",
"product_id": "kernel-default-extra-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.s390x",
"product_id": "kernel-default-kgraft-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-man-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-default-man-4.4.180-94.150.1.s390x",
"product_id": "kernel-default-man-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-obs-build-4.4.180-94.150.1.s390x",
"product_id": "kernel-obs-build-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-obs-qa-4.4.180-94.150.1.s390x",
"product_id": "kernel-obs-qa-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-syms-4.4.180-94.150.1.s390x",
"product_id": "kernel-syms-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-vanilla-4.4.180-94.150.1.s390x",
"product_id": "kernel-vanilla-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.150.1.s390x",
"product_id": "kernel-vanilla-base-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.150.1.s390x",
"product_id": "kernel-vanilla-devel-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-4.4.180-94.150.1.s390x",
"product": {
"name": "kernel-zfcpdump-4.4.180-94.150.1.s390x",
"product_id": "kernel-zfcpdump-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.150.1.s390x",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.150.1.s390x",
"product_id": "kselftests-kmp-default-4.4.180-94.150.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"product_id": "ocfs2-kmp-default-4.4.180-94.150.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-default-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-default-4.4.180-94.150.1.x86_64",
"product_id": "kernel-default-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-default-base-4.4.180-94.150.1.x86_64",
"product_id": "kernel-default-base-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-default-devel-4.4.180-94.150.1.x86_64",
"product_id": "kernel-default-devel-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"product_id": "kernel-default-kgraft-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-syms-4.4.180-94.150.1.x86_64",
"product_id": "kernel-syms-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"product": {
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"product_id": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-debug-4.4.180-94.150.1.x86_64",
"product": {
"name": "cluster-md-kmp-debug-4.4.180-94.150.1.x86_64",
"product_id": "cluster-md-kmp-debug-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"product_id": "cluster-md-kmp-default-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-debug-4.4.180-94.150.1.x86_64",
"product": {
"name": "dlm-kmp-debug-4.4.180-94.150.1.x86_64",
"product_id": "dlm-kmp-debug-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-4.4.180-94.150.1.x86_64",
"product": {
"name": "dlm-kmp-default-4.4.180-94.150.1.x86_64",
"product_id": "dlm-kmp-default-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-debug-4.4.180-94.150.1.x86_64",
"product": {
"name": "gfs2-kmp-debug-4.4.180-94.150.1.x86_64",
"product_id": "gfs2-kmp-debug-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"product": {
"name": "gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"product_id": "gfs2-kmp-default-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-debug-4.4.180-94.150.1.x86_64",
"product_id": "kernel-debug-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-base-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-debug-base-4.4.180-94.150.1.x86_64",
"product_id": "kernel-debug-base-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-debug-devel-4.4.180-94.150.1.x86_64",
"product_id": "kernel-debug-devel-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-extra-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-debug-extra-4.4.180-94.150.1.x86_64",
"product_id": "kernel-debug-extra-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-kgraft-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-debug-kgraft-4.4.180-94.150.1.x86_64",
"product_id": "kernel-debug-kgraft-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-default-extra-4.4.180-94.150.1.x86_64",
"product_id": "kernel-default-extra-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-obs-build-4.4.180-94.150.1.x86_64",
"product_id": "kernel-obs-build-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-obs-qa-4.4.180-94.150.1.x86_64",
"product_id": "kernel-obs-qa-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-vanilla-4.4.180-94.150.1.x86_64",
"product_id": "kernel-vanilla-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-base-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-vanilla-base-4.4.180-94.150.1.x86_64",
"product_id": "kernel-vanilla-base-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-vanilla-devel-4.4.180-94.150.1.x86_64",
"product": {
"name": "kernel-vanilla-devel-4.4.180-94.150.1.x86_64",
"product_id": "kernel-vanilla-devel-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-debug-4.4.180-94.150.1.x86_64",
"product": {
"name": "kselftests-kmp-debug-4.4.180-94.150.1.x86_64",
"product_id": "kselftests-kmp-debug-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-4.4.180-94.150.1.x86_64",
"product": {
"name": "kselftests-kmp-default-4.4.180-94.150.1.x86_64",
"product_id": "kselftests-kmp-default-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-debug-4.4.180-94.150.1.x86_64",
"product": {
"name": "ocfs2-kmp-debug-4.4.180-94.150.1.x86_64",
"product_id": "ocfs2-kmp-debug-4.4.180-94.150.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"product_id": "ocfs2-kmp-default-4.4.180-94.150.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-ha:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.150.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.150.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.150.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.150.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.150.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.150.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.150.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64 as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.150.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.150.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.150.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.150.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.150.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.150.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.150.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.150.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.150.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.150.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.150.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.150.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.150.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.150.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64 as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.150.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le"
},
"product_reference": "dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.150.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x"
},
"product_reference": "dlm-kmp-default-4.4.180-94.150.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64"
},
"product_reference": "dlm-kmp-default-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.150.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.150.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64"
},
"product_reference": "gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.150.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
"product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.150.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.150.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.150.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.150.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64"
},
"product_reference": "kernel-default-4.4.180-94.150.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le"
},
"product_reference": "kernel-default-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.150.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x"
},
"product_reference": "kernel-default-4.4.180-94.150.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.150.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64"
},
"product_reference": "kernel-default-base-4.4.180-94.150.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le"
},
"product_reference": "kernel-default-base-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.150.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x"
},
"product_reference": "kernel-default-base-4.4.180-94.150.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.150.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64"
},
"product_reference": "kernel-default-devel-4.4.180-94.150.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le"
},
"product_reference": "kernel-default-devel-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.150.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x"
},
"product_reference": "kernel-default-devel-4.4.180-94.150.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-kgraft-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-man-4.4.180-94.150.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x"
},
"product_reference": "kernel-default-man-4.4.180-94.150.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.150.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.150.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.150.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.150.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64"
},
"product_reference": "kernel-syms-4.4.180-94.150.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.150.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le"
},
"product_reference": "kernel-syms-4.4.180-94.150.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.150.1.s390x as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x"
},
"product_reference": "kernel-syms-4.4.180-94.150.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le"
},
"product_reference": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
},
"product_reference": "kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-base-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-default-devel-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-4.4.180-94.150.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-devel-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-4.4.180-94.150.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-macros-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-4.4.180-94.150.1.noarch as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch"
},
"product_reference": "kernel-source-4.4.180-94.150.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-4.4.180-94.150.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64"
},
"product_reference": "kernel-syms-4.4.180-94.150.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3-BCL"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-17862",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17862"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 ignores unreachable code, even though it would still be processed by JIT compilers. This behavior, also considered an improper branch-pruning logic issue, could possibly be used by local users for denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17862",
"url": "https://www.suse.com/security/cve/CVE-2017-17862"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17862",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2017-17862"
},
{
"cve": "CVE-2017-17864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-17864"
}
],
"notes": [
{
"category": "general",
"text": "kernel/bpf/verifier.c in the Linux kernel through 4.14.8 mishandles states_equal comparisons between the pointer data type and the UNKNOWN_VALUE data type, which allows local users to obtain potentially sensitive address information, aka a \"pointer leak.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-17864",
"url": "https://www.suse.com/security/cve/CVE-2017-17864"
},
{
"category": "external",
"summary": "SUSE Bug 1073928 for CVE-2017-17864",
"url": "https://bugzilla.suse.com/1073928"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2017-17864"
},
{
"cve": "CVE-2018-13405",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-13405"
}
],
"notes": [
{
"category": "general",
"text": "The inode_init_owner function in fs/inode.c in the Linux kernel through 3.16 allows local users to create files with an unintended group ownership, in a scenario where a directory is SGID to a certain group and is writable by a user who is not a member of that group. Here, the non-member can trigger creation of a plain file whose group ownership is that group. The intended behavior was that the non-member can trigger creation of a directory (but not a plain file) whose group ownership is that group. The non-member can escalate privileges by making the plain file executable and SGID.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-13405",
"url": "https://www.suse.com/security/cve/CVE-2018-13405"
},
{
"category": "external",
"summary": "SUSE Bug 1087082 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1087082"
},
{
"category": "external",
"summary": "SUSE Bug 1100416 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1100416"
},
{
"category": "external",
"summary": "SUSE Bug 1129735 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1129735"
},
{
"category": "external",
"summary": "SUSE Bug 1195161 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1195161"
},
{
"category": "external",
"summary": "SUSE Bug 1198702 for CVE-2018-13405",
"url": "https://bugzilla.suse.com/1198702"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2018-13405"
},
{
"cve": "CVE-2018-16882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16882"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free issue was found in the way the Linux kernel\u0027s KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the \u0027pi_desc_page\u0027 without resetting \u0027pi_desc\u0027 descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions before 4.14.91 and before 4.19.13 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16882",
"url": "https://www.suse.com/security/cve/CVE-2018-16882"
},
{
"category": "external",
"summary": "SUSE Bug 1119934 for CVE-2018-16882",
"url": "https://bugzilla.suse.com/1119934"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2018-16882"
},
{
"cve": "CVE-2020-0429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-0429"
}
],
"notes": [
{
"category": "general",
"text": "In l2tp_session_delete and related functions of l2tp_core.c, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-152735806",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-0429",
"url": "https://www.suse.com/security/cve/CVE-2020-0429"
},
{
"category": "external",
"summary": "SUSE Bug 1176724 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176724"
},
{
"category": "external",
"summary": "SUSE Bug 1176931 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1176931"
},
{
"category": "external",
"summary": "SUSE Bug 1188026 for CVE-2020-0429",
"url": "https://bugzilla.suse.com/1188026"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2020-0429"
},
{
"cve": "CVE-2020-12655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12655"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12655",
"url": "https://www.suse.com/security/cve/CVE-2020-12655"
},
{
"category": "external",
"summary": "SUSE Bug 1171217 for CVE-2020-12655",
"url": "https://bugzilla.suse.com/1171217"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.8,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "low"
}
],
"title": "CVE-2020-12655"
},
{
"cve": "CVE-2020-14305",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-14305"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds memory write flaw was found in how the Linux kernel\u0027s Voice Over IP H.323 connection tracking functionality handled connections on ipv6 port 1720. This flaw allows an unauthenticated remote user to crash the system, causing a denial of service. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-14305",
"url": "https://www.suse.com/security/cve/CVE-2020-14305"
},
{
"category": "external",
"summary": "SUSE Bug 1173346 for CVE-2020-14305",
"url": "https://bugzilla.suse.com/1173346"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2020-14305"
},
{
"cve": "CVE-2020-3702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-3702"
}
],
"notes": [
{
"category": "general",
"text": "u\u0027Specifically timed and handcrafted traffic can cause internal errors in a WLAN device that lead to improper layer 2 Wi-Fi encryption with a consequent possibility of information disclosure over the air for a discrete set of traffic\u0027 in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice \u0026 Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking in APQ8053, IPQ4019, IPQ8064, MSM8909W, MSM8996AU, QCA9531, QCN5502, QCS405, SDX20, SM6150, SM7150",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-3702",
"url": "https://www.suse.com/security/cve/CVE-2020-3702"
},
{
"category": "external",
"summary": "SUSE Bug 1191193 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191193"
},
{
"category": "external",
"summary": "SUSE Bug 1191529 for CVE-2020-3702",
"url": "https://bugzilla.suse.com/1191529"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2020-3702"
},
{
"cve": "CVE-2020-4788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-4788"
}
],
"notes": [
{
"category": "general",
"text": "IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-4788",
"url": "https://www.suse.com/security/cve/CVE-2020-4788"
},
{
"category": "external",
"summary": "SUSE Bug 1177666 for CVE-2020-4788",
"url": "https://bugzilla.suse.com/1177666"
},
{
"category": "external",
"summary": "SUSE Bug 1181158 for CVE-2020-4788",
"url": "https://bugzilla.suse.com/1181158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2020-4788"
},
{
"cve": "CVE-2021-20265",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20265"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way memory resources were freed in the unix_stream_recvmsg function in the Linux kernel when a signal was pending. This flaw allows an unprivileged local user to crash the system by exhausting available memory. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20265",
"url": "https://www.suse.com/security/cve/CVE-2021-20265"
},
{
"category": "external",
"summary": "SUSE Bug 1183089 for CVE-2021-20265",
"url": "https://bugzilla.suse.com/1183089"
},
{
"category": "external",
"summary": "SUSE Bug 1214268 for CVE-2021-20265",
"url": "https://bugzilla.suse.com/1214268"
},
{
"category": "external",
"summary": "SUSE Bug 1218966 for CVE-2021-20265",
"url": "https://bugzilla.suse.com/1218966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-20265"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-33033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33033"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33033",
"url": "https://www.suse.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "SUSE Bug 1186109 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "external",
"summary": "SUSE Bug 1186283 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186283"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-34556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34556"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because the protection mechanism neglects the possibility of uninitialized memory locations on the BPF stack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34556",
"url": "https://www.suse.com/security/cve/CVE-2021-34556"
},
{
"category": "external",
"summary": "SUSE Bug 1188983 for CVE-2021-34556",
"url": "https://bugzilla.suse.com/1188983"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-34556"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3542"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3542",
"url": "https://www.suse.com/security/cve/CVE-2021-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1186063 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1186063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-3542"
},
{
"cve": "CVE-2021-35477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-35477"
}
],
"notes": [
{
"category": "general",
"text": "In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-35477",
"url": "https://www.suse.com/security/cve/CVE-2021-35477"
},
{
"category": "external",
"summary": "SUSE Bug 1188985 for CVE-2021-35477",
"url": "https://bugzilla.suse.com/1188985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-35477"
},
{
"cve": "CVE-2021-3640",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3640"
}
],
"notes": [
{
"category": "general",
"text": "A flaw use-after-free in function sco_sock_sendmsg() of the Linux kernel HCI subsystem was found in the way user calls ioct UFFDIO_REGISTER or other way triggers race condition of the call sco_conn_del() together with the call sco_sock_sendmsg() with the expected controllable faulting memory page. A privileged local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3640",
"url": "https://www.suse.com/security/cve/CVE-2021-3640"
},
{
"category": "external",
"summary": "SUSE Bug 1188172 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188172"
},
{
"category": "external",
"summary": "SUSE Bug 1188613 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1188613"
},
{
"category": "external",
"summary": "SUSE Bug 1191530 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1191530"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3640",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-3640"
},
{
"cve": "CVE-2021-3653",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3653"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the \"int_ctl\" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3653",
"url": "https://www.suse.com/security/cve/CVE-2021-3653"
},
{
"category": "external",
"summary": "SUSE Bug 1189399 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189399"
},
{
"category": "external",
"summary": "SUSE Bug 1189420 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1189420"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-3653",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-3653"
},
{
"cve": "CVE-2021-3655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3655"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3655",
"url": "https://www.suse.com/security/cve/CVE-2021-3655"
},
{
"category": "external",
"summary": "SUSE Bug 1188563 for CVE-2021-3655",
"url": "https://bugzilla.suse.com/1188563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "low"
}
],
"title": "CVE-2021-3655"
},
{
"cve": "CVE-2021-3659",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3659"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u0027s IEEE 802.15.4 wireless networking subsystem in the way the user closes the LR-WPAN connection. This flaw allows a local user to crash the system. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3659",
"url": "https://www.suse.com/security/cve/CVE-2021-3659"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-3659",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-3659"
},
{
"cve": "CVE-2021-3679",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3679"
}
],
"notes": [
{
"category": "general",
"text": "A lack of CPU resource in the Linux kernel tracing module functionality in versions prior to 5.14-rc3 was found in the way user uses trace ring buffer in a specific way. Only privileged local users (with CAP_SYS_ADMIN capability) could use this flaw to starve the resources causing denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3679",
"url": "https://www.suse.com/security/cve/CVE-2021-3679"
},
{
"category": "external",
"summary": "SUSE Bug 1189057 for CVE-2021-3679",
"url": "https://bugzilla.suse.com/1189057"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-3679"
},
{
"cve": "CVE-2021-3715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3715"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3715",
"url": "https://www.suse.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "SUSE Bug 1190349 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "external",
"summary": "SUSE Bug 1190350 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190350"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1196722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-3732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3732"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel\u0027s OverlayFS subsystem in the way the user mounts the TmpFS filesystem with OverlayFS. This flaw allows a local user to gain access to hidden files that should not be accessible.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3732",
"url": "https://www.suse.com/security/cve/CVE-2021-3732"
},
{
"category": "external",
"summary": "SUSE Bug 1189706 for CVE-2021-3732",
"url": "https://bugzilla.suse.com/1189706"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "low"
}
],
"title": "CVE-2021-3732"
},
{
"cve": "CVE-2021-3752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3752"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free flaw was found in the Linux kernel\u0027s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3752",
"url": "https://www.suse.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "SUSE Bug 1190023 for CVE-2021-3752",
"url": "https://bugzilla.suse.com/1190023"
},
{
"category": "external",
"summary": "SUSE Bug 1190432 for CVE-2021-3752",
"url": "https://bugzilla.suse.com/1190432"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-3752"
},
{
"cve": "CVE-2021-3753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3753"
}
],
"notes": [
{
"category": "general",
"text": "A race problem was seen in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel, which may cause an out of bounds read in vt as the write access to vc_mode is not protected by lock-in vt_ioctl (KDSETMDE). The highest threat from this vulnerability is to data confidentiality.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3753",
"url": "https://www.suse.com/security/cve/CVE-2021-3753"
},
{
"category": "external",
"summary": "SUSE Bug 1190025 for CVE-2021-3753",
"url": "https://bugzilla.suse.com/1190025"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "low"
}
],
"title": "CVE-2021-3753"
},
{
"cve": "CVE-2021-37576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37576"
}
],
"notes": [
{
"category": "general",
"text": "arch/powerpc/kvm/book3s_rtas.c in the Linux kernel through 5.13.5 on the powerpc platform allows KVM guest OS users to cause host OS memory corruption via rtas_args.nargs, aka CID-f62f3c20647e.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37576",
"url": "https://www.suse.com/security/cve/CVE-2021-37576"
},
{
"category": "external",
"summary": "SUSE Bug 1188838 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188838"
},
{
"category": "external",
"summary": "SUSE Bug 1188842 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1188842"
},
{
"category": "external",
"summary": "SUSE Bug 1190276 for CVE-2021-37576",
"url": "https://bugzilla.suse.com/1190276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-37576"
},
{
"cve": "CVE-2021-3760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3760"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3760",
"url": "https://www.suse.com/security/cve/CVE-2021-3760"
},
{
"category": "external",
"summary": "SUSE Bug 1190067 for CVE-2021-3760",
"url": "https://bugzilla.suse.com/1190067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-3760"
},
{
"cve": "CVE-2021-3772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3772"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3772",
"url": "https://www.suse.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "SUSE Bug 1190351 for CVE-2021-3772",
"url": "https://bugzilla.suse.com/1190351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-3772"
},
{
"cve": "CVE-2021-38160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38160"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** In drivers/char/virtio_console.c in the Linux kernel before 5.13.4, data corruption or loss can be triggered by an untrusted device that supplies a buf-\u003elen value exceeding the buffer size. NOTE: the vendor indicates that the cited data corruption is not a vulnerability in any existing use case; the length validation was added solely for robustness in the face of anomalous host OS behavior.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38160",
"url": "https://www.suse.com/security/cve/CVE-2021-38160"
},
{
"category": "external",
"summary": "SUSE Bug 1190117 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190117"
},
{
"category": "external",
"summary": "SUSE Bug 1190118 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1190118"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38160",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-38160"
},
{
"cve": "CVE-2021-38198",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38198"
}
],
"notes": [
{
"category": "general",
"text": "arch/x86/kvm/mmu/paging_tmpl.h in the Linux kernel before 5.12.11 incorrectly computes the access permissions of a shadow page, leading to a missing guest protection page fault.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38198",
"url": "https://www.suse.com/security/cve/CVE-2021-38198"
},
{
"category": "external",
"summary": "SUSE Bug 1189262 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189262"
},
{
"category": "external",
"summary": "SUSE Bug 1189278 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1189278"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-38198",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-38198"
},
{
"cve": "CVE-2021-38204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38204"
}
],
"notes": [
{
"category": "general",
"text": "drivers/usb/host/max3421-hcd.c in the Linux kernel before 5.13.6 allows physically proximate attackers to cause a denial of service (use-after-free and panic) by removing a MAX-3421 USB device in certain situations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38204",
"url": "https://www.suse.com/security/cve/CVE-2021-38204"
},
{
"category": "external",
"summary": "SUSE Bug 1189291 for CVE-2021-38204",
"url": "https://bugzilla.suse.com/1189291"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-38204"
},
{
"cve": "CVE-2021-3896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3896"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3896",
"url": "https://www.suse.com/security/cve/CVE-2021-3896"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-3896",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-3896"
},
{
"cve": "CVE-2021-40490",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-40490"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem in the Linux kernel through 5.13.13.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-40490",
"url": "https://www.suse.com/security/cve/CVE-2021-40490"
},
{
"category": "external",
"summary": "SUSE Bug 1190159 for CVE-2021-40490",
"url": "https://bugzilla.suse.com/1190159"
},
{
"category": "external",
"summary": "SUSE Bug 1192775 for CVE-2021-40490",
"url": "https://bugzilla.suse.com/1192775"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-40490"
},
{
"cve": "CVE-2021-42008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42008"
}
],
"notes": [
{
"category": "general",
"text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42008",
"url": "https://www.suse.com/security/cve/CVE-2021-42008"
},
{
"category": "external",
"summary": "SUSE Bug 1191315 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "external",
"summary": "SUSE Bug 1191660 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191660"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-42008"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:kernel-default-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kernel-devel-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-macros-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-source-4.4.180-94.150.1.noarch",
"HPE Helion OpenStack 8:kernel-syms-4.4.180-94.150.1.x86_64",
"HPE Helion OpenStack 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-BCL:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-default-man-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.aarch64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.s390x",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP3-LTSS:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.180-94.150.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-base-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-devel-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-default-kgraft-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kernel-devel-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-macros-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-source-4.4.180-94.150.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:kernel-syms-4.4.180-94.150.1.x86_64",
"SUSE OpenStack Cloud Crowbar 8:kgraft-patch-4_4_180-94_150-default-1-4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-12-06T12:28:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
WID-SEC-W-2022-0228
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "niedrig"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0228 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0228.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0228 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0228"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2013180 vom 2021-11-04",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5139-1 vom 2021-11-11",
"url": "https://ubuntu.com/security/notices/USN-5139-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3675-1 vom 2021-11-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3807-1 vom 2021-11-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-November/009777.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3806-1 vom 2021-11-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5165-1 vom 2021-12-01",
"url": "https://ubuntu.com/security/notices/USN-5165-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1686-1 vom 2022-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1668-1 vom 2022-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:14849-1 vom 2021-12-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3929-1 vom 2021-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009844.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3935-1 vom 2021-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3933-1 vom 2021-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2083-1 vom 2022-06-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3978-1 vom 2021-12-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2843 vom 2021-12-16",
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5208-1 vom 2022-01-06",
"url": "https://ubuntu.com/security/notices/USN-5208-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5209-1 vom 2022-01-06",
"url": "https://ubuntu.com/security/notices/USN-5209-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5210-1 vom 2022-01-06",
"url": "https://ubuntu.com/security/notices/USN-5210-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5218-1 vom 2022-01-11",
"url": "https://ubuntu.com/security/notices/USN-5218-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5210-2 vom 2022-01-12",
"url": "https://ubuntu.com/security/notices/USN-5210-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-1988 vom 2022-05-17",
"url": "https://linux.oracle.com/errata/ELSA-2022-1988.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5096 vom 2022-03-09",
"url": "https://lists.debian.org/debian-security-announce/2022/msg00063.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2941 vom 2022-03-09",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5343-1 vom 2022-03-22",
"url": "https://ubuntu.com/security/notices/USN-5343-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:4956 vom 2022-06-09",
"url": "https://access.redhat.com/errata/RHSA-2022:4956"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2111-1 vom 2022-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2103-1 vom 2022-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1975 vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1988 vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1651-1 vom 2022-05-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5483 vom 2022-07-01",
"url": "https://access.redhat.com/errata/RHSA-2022:5483"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2365-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018897.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2362-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018905.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2384-1 vom 2024-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018921.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2895-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-08-13T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:27:27.841+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0228",
"initial_release_date": "2021-11-04T23:00:00.000+00:00",
"revision_history": [
{
"date": "2021-11-04T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-11-10T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-25T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-30T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2021-12-01T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-12-06T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-12-09T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-12-16T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-01-05T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-01-10T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-01-12T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-03-09T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-03-22T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-05-10T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-05-12T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-05-16T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-05-17T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-06-08T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-06-14T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-16T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-19T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-07-03T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-18T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "27"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.14.15",
"product": {
"name": "Open Source Linux Kernel \u003c5.14.15",
"product_id": "T020943"
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43389",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Linux Kernel. Die Schwachstelle ist auf einen Array-Index-out-of-bounds-Fehler zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T004914"
]
},
"release_date": "2021-11-04T23:00:00.000+00:00",
"title": "CVE-2021-43389"
}
]
}
wid-sec-w-2022-0228
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "niedrig"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle im Linux Kernel ausnutzen, um einen Denial of Service zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-0228 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-0228.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-0228 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0228"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 2013180 vom 2021-11-04",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5139-1 vom 2021-11-11",
"url": "https://ubuntu.com/security/notices/USN-5139-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3675-1 vom 2021-11-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-November/009734.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3807-1 vom 2021-11-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-November/009777.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3806-1 vom 2021-11-25",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-November/009774.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5165-1 vom 2021-12-01",
"url": "https://ubuntu.com/security/notices/USN-5165-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1686-1 vom 2022-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011035.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1668-1 vom 2022-05-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011019.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:14849-1 vom 2021-12-01",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009784.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3929-1 vom 2021-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009844.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3935-1 vom 2021-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009856.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3933-1 vom 2021-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009843.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2083-1 vom 2022-06-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011291.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3978-1 vom 2021-12-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-December/009873.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2843 vom 2021-12-16",
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5208-1 vom 2022-01-06",
"url": "https://ubuntu.com/security/notices/USN-5208-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5209-1 vom 2022-01-06",
"url": "https://ubuntu.com/security/notices/USN-5209-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5210-1 vom 2022-01-06",
"url": "https://ubuntu.com/security/notices/USN-5210-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5218-1 vom 2022-01-11",
"url": "https://ubuntu.com/security/notices/USN-5218-1"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5210-2 vom 2022-01-12",
"url": "https://ubuntu.com/security/notices/USN-5210-2"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2022-1988 vom 2022-05-17",
"url": "https://linux.oracle.com/errata/ELSA-2022-1988.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5096 vom 2022-03-09",
"url": "https://lists.debian.org/debian-security-announce/2022/msg00063.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2941 vom 2022-03-09",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-5343-1 vom 2022-03-22",
"url": "https://ubuntu.com/security/notices/USN-5343-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:4956 vom 2022-06-09",
"url": "https://access.redhat.com/errata/RHSA-2022:4956"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2111-1 vom 2022-06-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011310.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:2103-1 vom 2022-06-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011299.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1975 vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:1988 vom 2022-05-10",
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:1651-1 vom 2022-05-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/010994.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:5483 vom 2022-07-01",
"url": "https://access.redhat.com/errata/RHSA-2022:5483"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2365-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018897.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2360-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018907.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2362-1 vom 2024-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018905.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2384-1 vom 2024-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/018921.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2561-1 vom 2024-07-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-July/019001.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:2895-1 vom 2024-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019186.html"
}
],
"source_lang": "en-US",
"title": "Linux Kernel: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-08-13T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:27:27.841+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-0228",
"initial_release_date": "2021-11-04T23:00:00.000+00:00",
"revision_history": [
{
"date": "2021-11-04T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-11-10T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2021-11-16T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-25T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-30T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2021-12-01T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-12-06T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-12-09T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-12-16T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-01-05T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-01-10T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-01-12T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-03-09T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2022-03-22T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2022-05-10T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-05-12T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-05-16T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-05-17T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-06-08T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-06-14T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-16T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-06-19T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-07-03T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-09T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-07-18T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-08-13T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "27"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.14.15",
"product": {
"name": "Open Source Linux Kernel \u003c5.14.15",
"product_id": "T020943"
}
}
],
"category": "product_name",
"name": "Linux Kernel"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43389",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle im Linux Kernel. Die Schwachstelle ist auf einen Array-Index-out-of-bounds-Fehler zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T000126",
"T004914"
]
},
"release_date": "2021-11-04T23:00:00.000+00:00",
"title": "CVE-2021-43389"
}
]
}
rhsa-2022_1988
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1988",
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1888433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888433"
},
{
"category": "external",
"summary": "1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "1957375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957375"
},
{
"category": "external",
"summary": "1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "1978123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978123"
},
{
"category": "external",
"summary": "1981950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981950"
},
{
"category": "external",
"summary": "1983894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983894"
},
{
"category": "external",
"summary": "1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "1994390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994390"
},
{
"category": "external",
"summary": "1997338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997338"
},
{
"category": "external",
"summary": "1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "2009312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009312"
},
{
"category": "external",
"summary": "2009521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009521"
},
{
"category": "external",
"summary": "2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "2011104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011104"
},
{
"category": "external",
"summary": "2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "2015525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015525"
},
{
"category": "external",
"summary": "2015755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015755"
},
{
"category": "external",
"summary": "2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "2017073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017073"
},
{
"category": "external",
"summary": "2017796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017796"
},
{
"category": "external",
"summary": "2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "2022814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022814"
},
{
"category": "external",
"summary": "2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2030476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030476"
},
{
"category": "external",
"summary": "2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "2031200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031200"
},
{
"category": "external",
"summary": "2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "2042798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042798"
},
{
"category": "external",
"summary": "2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "2043453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043453"
},
{
"category": "external",
"summary": "2046021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046021"
},
{
"category": "external",
"summary": "2048251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048251"
},
{
"category": "external",
"summary": "2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1988.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2024-12-12T15:53:17+00:00",
"generator": {
"date": "2024-12-12T15:53:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2022:1988",
"initial_release_date": "2022-05-10T13:58:00+00:00",
"revision_history": [
{
"date": "2022-05-10T13:58:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:58:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-12T15:53:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "perf-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "perf-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.s390x",
"product_id": "perf-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.src",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.src",
"product_id": "kernel-0:4.18.0-372.9.1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.9.1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"product_id": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.9.1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.src",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.src",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0404",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919791"
}
],
"notes": [
{
"category": "description",
"text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: avoid cyclic entity chains due to malformed USB descriptors",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0404"
},
{
"category": "external",
"summary": "RHBZ#1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: avoid cyclic entity chains due to malformed USB descriptors"
},
{
"acknowledgments": [
{
"names": [
"Anthony Steinhauser"
],
"organization": "Google\u0027s Safeside Project"
}
],
"cve": "CVE-2020-4788",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1888433"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. IBM Power9 processors can speculatively operate on data stored in the L1 cache before it has been completely validated. The attack has limited access to memory and is only able to access memory normally permissible to the execution context. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: speculation on incompletely validated data on IBM Power9",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-4788"
},
{
"category": "external",
"summary": "RHBZ#1888433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888433"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-4788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-4788"
},
{
"category": "external",
"summary": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189296",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189296"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc",
"url": "https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/20/3",
"url": "https://www.openwall.com/lists/oss-security/2020/11/20/3"
}
],
"release_date": "2020-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: speculation on incompletely validated data on IBM Power9"
},
{
"cve": "CVE-2020-13974",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016169"
}
],
"notes": [
{
"category": "description",
"text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13974"
},
{
"category": "external",
"summary": "RHBZ#2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13974"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"
}
],
"release_date": "2020-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c"
},
{
"acknowledgments": [
{
"names": [
"Jeremy Cline"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-27820",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901726"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in nouveau kernel module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27820"
},
{
"category": "external",
"summary": "RHBZ#1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"
}
],
"release_date": "2020-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: use-after-free in nouveau kernel module"
},
{
"cve": "CVE-2021-0941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018205"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "RHBZ#2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941"
},
{
"category": "external",
"summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0",
"url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free"
},
{
"acknowledgments": [
{
"names": [
"Murray McAllister"
]
}
],
"cve": "CVE-2021-3612",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974079"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "RHBZ#1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
}
],
"release_date": "2021-06-20T12:28:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()"
},
{
"cve": "CVE-2021-3669",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986473"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3669"
},
{
"category": "external",
"summary": "RHBZ#1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669"
}
],
"release_date": "2021-08-02T06:02:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-3743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997961"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3743"
},
{
"category": "external",
"summary": "RHBZ#1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"
},
{
"category": "external",
"summary": "https://lists.openwall.net/netdev/2021/08/17/124",
"url": "https://lists.openwall.net/netdev/2021/08/17/124"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c"
},
{
"cve": "CVE-2021-3744",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "RHBZ#2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744"
},
{
"category": "external",
"summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0",
"url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
},
{
"acknowledgments": [
{
"names": [
"Likang Luo"
],
"organization": "NSFOCUS Security Team"
}
],
"cve": "CVE-2021-3752",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999544"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible use-after-free in bluetooth module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "RHBZ#1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4",
"url": "https://www.openwall.com/lists/oss-security/2021/09/15/4"
}
],
"release_date": "2021-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible use-after-free in bluetooth module"
},
{
"acknowledgments": [
{
"names": [
"Yutian Yang"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999675"
}
],
"notes": [
{
"category": "description",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "RHBZ#1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/",
"url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"
}
],
"release_date": "2021-07-15T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks"
},
{
"cve": "CVE-2021-3764",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997467"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in ccp_run_aes_gcm_cmd() function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "RHBZ#1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"
}
],
"release_date": "2021-08-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in ccp_run_aes_gcm_cmd() function"
},
{
"cve": "CVE-2021-3772",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2021-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000694"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "RHBZ#2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772"
}
],
"release_date": "2021-09-08T06:38:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations"
},
{
"cve": "CVE-2021-3773",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3773"
},
{
"category": "external",
"summary": "RHBZ#2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773"
}
],
"release_date": "2021-09-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients"
},
{
"acknowledgments": [
{
"names": [
"elijahbai, jitxie, huntazhang."
]
}
],
"cve": "CVE-2021-3923",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2019643"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack information leak in infiniband RDMA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3923"
},
{
"category": "external",
"summary": "RHBZ#2019643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923"
}
],
"release_date": "2021-12-01T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack information leak in infiniband RDMA"
},
{
"cve": "CVE-2021-4002",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025726"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible leak or coruption of data residing on hugetlbfs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4002"
},
{
"category": "external",
"summary": "RHBZ#2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/11/25/1"
}
],
"release_date": "2021-11-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible leak or coruption of data residing on hugetlbfs"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027239"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security regression for CVE-2018-13405",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "RHBZ#2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"
}
],
"release_date": "2021-09-16T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security regression for CVE-2018-13405"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2021-4093",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2028584"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4093"
},
{
"category": "external",
"summary": "RHBZ#2028584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"
}
],
"release_date": "2021-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io"
},
{
"cve": "CVE-2021-4157",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034342"
}
],
"notes": [
{
"category": "description",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overwrite in decode_nfs_fh function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "RHBZ#2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"
}
],
"release_date": "2021-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer overwrite in decode_nfs_fh function"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Keyu Man, Xin\u0027an Zhou and Zhiyun Qian"
],
"organization": "University of California, Riverside"
}
],
"cve": "CVE-2021-20322",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2014230"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "RHBZ#2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43"
}
],
"release_date": "2021-08-26T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies"
},
{
"cve": "CVE-2021-21781",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-07-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981950"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw exists in the ARM SIGPAGE functionality of the Linux kernel. An attacker with a local account can read the contents of the sigpage, which contains previously initialized kernel memory contents. This flaw requires an attacker to read a process\u2019s memory at a specific offset to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: arm: SIGPAGE information disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21781"
},
{
"category": "external",
"summary": "RHBZ#1981950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981950"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21781"
},
{
"category": "external",
"summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243"
}
],
"release_date": "2021-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: arm: SIGPAGE information disclosure vulnerability"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26401",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26401"
},
{
"category": "external",
"summary": "RHBZ#2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "AMD recommends mitigation that uses generic retpoline.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-37159",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1985353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "RHBZ#1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159"
},
{
"category": "external",
"summary": "https://www.spinics.net/lists/linux-usb/msg202228.html",
"url": "https://www.spinics.net/lists/linux-usb/msg202228.html"
}
],
"release_date": "2020-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c"
},
{
"cve": "CVE-2021-41864",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2010463"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "RHBZ#2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a",
"url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"
}
],
"release_date": "2021-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write"
},
{
"cve": "CVE-2021-42739",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951739"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap buffer overflow in firedtv driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "RHBZ#1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/",
"url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"
}
],
"release_date": "2021-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Heap buffer overflow in firedtv driver"
},
{
"cve": "CVE-2021-43056",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017073"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service problem was found in the Linux kernel\u0027s Kernel-based Virtual Machine (KVM) specific to PowerPC. In this flaw, a user with local access can confuse the host offline code, causing the guest to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ppc: kvm: allows a malicious KVM guest to crash the host",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43056"
},
{
"category": "external",
"summary": "RHBZ#2017073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43056"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337"
}
],
"release_date": "2021-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ppc: kvm: allows a malicious KVM guest to crash the host"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-43389",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2013180"
}
],
"notes": [
{
"category": "description",
"text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "RHBZ#2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
}
],
"release_date": "2021-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c"
},
{
"cve": "CVE-2021-43976",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025003"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "RHBZ#2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976"
},
{
"category": "external",
"summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/",
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"
}
],
"release_date": "2021-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device"
},
{
"acknowledgments": [
{
"names": [
"Patrik Lantz"
],
"organization": "axis.com"
}
],
"cve": "CVE-2021-44733",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030747"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in the TEE subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44733"
},
{
"category": "external",
"summary": "RHBZ#2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/",
"url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"
}
],
"release_date": "2021-12-14T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in the TEE subsystem"
},
{
"cve": "CVE-2021-45485",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039911"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv6 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45485"
},
{
"category": "external",
"summary": "RHBZ#2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/",
"url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"
}
],
"release_date": "2021-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv6 implementation"
},
{
"cve": "CVE-2021-45486",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039914"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv4 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45486"
},
{
"category": "external",
"summary": "RHBZ#2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2112.09604.pdf",
"url": "https://arxiv.org/pdf/2112.09604.pdf"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"
}
],
"release_date": "2021-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv4 implementation"
},
{
"cve": "CVE-2021-47076",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267525"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Return CQE error if invalid lkey was supplied\n\nRXE is missing update of WQE status in LOCAL_WRITE failures. This caused\nthe following kernel panic if someone sent an atomic operation with an\nexplicitly wrong lkey.\n\n[leonro@vm ~]$ mkt test\ntest_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ...\n WARNING: CPU: 5 PID: 263 at drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Modules linked in: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core\n CPU: 5 PID: 263 Comm: python3 Not tainted 5.13.0-rc1+ #2936\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Code: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 00 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff \u003c0f\u003e 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 00 00 e9 ab e7 ff\n RSP: 0018:ffff8880158af090 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652\n RDX: 1ffff9200004b442 RSI: 0000000000000004 RDI: ffffc9000025a210\n RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b\n R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff88800f3b63e8\n R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c\n FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0xb11/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_responder+0x5532/0x7620 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0x9c8/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_requester+0x1efd/0x58c0 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_post_send+0x998/0x1860 [rdma_rxe]\n ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs]\n ib_uverbs_write+0x847/0xc80 [ib_uverbs]\n vfs_write+0x1c5/0x840\n ksys_write+0x176/0x1d0\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47076"
},
{
"category": "external",
"summary": "RHBZ#2267525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267525"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47076"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u"
}
],
"release_date": "2024-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied"
},
{
"cve": "CVE-2021-47203",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2274634"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel while parsing the txq list in the lpfc_drain_txq() function. Due to improper handling of a local fail message string which is set when a job fails and is never unset for subsequent jobs, this issue can lead to list corruption as jobs may be added to both the txq and the completions list. This could result in system instability or inconsistencies.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.6 and above (including 8.10):\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()\n\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47203"
},
{
"category": "external",
"summary": "RHBZ#2274634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274634"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47203"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47203-ff72@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47203-ff72@gregkh/T"
}
],
"release_date": "2024-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"cve": "CVE-2021-47498",
"cwe": {
"id": "CWE-399",
"name": "CWE-399"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282917"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm rq: don\u0027t queue request to blk-mq during DM suspend\n\nDM uses blk-mq\u0027s quiesce/unquiesce to stop/start device mapper queue.\n\nBut blk-mq\u0027s unquiesce may come from outside events, such as elevator\nswitch, updating nr_requests or others, and request may come during\nsuspend, so simply ask for blk-mq to requeue it.\n\nFixes one kernel panic issue when running updating nr_requests and\ndm-mpath suspend/resume stress test.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm rq: don\u0027t queue request to blk-mq during DM suspend",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.6 and above (including 8.10):\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) dm rq: don\u0027t queue request to blk-mq during DM suspend\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47498"
},
{
"category": "external",
"summary": "RHBZ#2282917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282917"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47498",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47498"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052243-CVE-2021-47498-dc02@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052243-CVE-2021-47498-dc02@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm rq: don\u0027t queue request to blk-mq during DM suspend"
},
{
"cve": "CVE-2021-47501",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283453"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL pointer dereference in i40e_dbg_dump_desc\n\nWhen trying to dump VFs VSI RX/TX descriptors\nusing debugfs there was a crash\ndue to NULL pointer dereference in i40e_dbg_dump_desc.\nAdded a check to i40e_dbg_dump_desc that checks if\nVSI type is correct for dumping RX/TX descriptors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47501"
},
{
"category": "external",
"summary": "RHBZ#2283453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47501"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2021-47556",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283393"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47556"
},
{
"category": "external",
"summary": "RHBZ#2283393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()"
},
{
"cve": "CVE-2021-47590",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293237"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47590"
},
{
"category": "external",
"summary": "RHBZ#2293237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()"
},
{
"cve": "CVE-2021-47614",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293265"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix a user-after-free in add_pble_prm\n\nWhen irdma_hmc_sd_one fails, \u0027chunk\u0027 is freed while its still on the PBLE\ninfo list.\n\nAdd the chunk entry to the PBLE info list only after successful setting of\nthe SD in irdma_hmc_sd_one.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47614"
},
{
"category": "external",
"summary": "RHBZ#2293265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0001",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061712"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Branch History Injection (BHI)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0001"
},
{
"category": "external",
"summary": "RHBZ#2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Branch History Injection (BHI)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0002",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061721"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Intra-Mode BTI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0002"
},
{
"category": "external",
"summary": "RHBZ#2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Intra-Mode BTI"
},
{
"acknowledgments": [
{
"names": [
"De4dCr0w"
],
"organization": "360 Vulnerability Research Institute"
}
],
"cve": "CVE-2022-0286",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037019"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local denial of service in bond_ipsec_add_sa",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0286"
},
{
"category": "external",
"summary": "RHBZ#2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"
}
],
"release_date": "2021-07-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local denial of service in bond_ipsec_add_sa"
},
{
"cve": "CVE-2022-0322",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2021-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0322"
},
{
"category": "external",
"summary": "RHBZ#2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"
}
],
"release_date": "2021-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060606"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in copy_page_to_iter() in iov_iter.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0850"
},
{
"category": "external",
"summary": "RHBZ#2060606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8",
"url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"
}
],
"release_date": "2021-05-06T19:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in copy_page_to_iter() in iov_iter.c"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi",
"Jann Horn"
]
}
],
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064855"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "RHBZ#2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"
}
],
"release_date": "2022-03-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3105",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153067"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3105"
},
{
"category": "external",
"summary": "RHBZ#2153067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3106",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153066"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3106"
},
{
"category": "external",
"summary": "RHBZ#2153066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3108",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153052"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3108"
},
{
"category": "external",
"summary": "RHBZ#2153052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()"
},
{
"cve": "CVE-2022-48771",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293337"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/vmwgfx: Fix stale file descriptors on failed usercopy\n\nA failing usercopy of the fence_rep object will lead to a stale entry in\nthe file descriptor table as put_unused_fd() won\u0027t release it. This\nenables userland to refer to a dangling \u0027file\u0027 object through that still\nvalid file descriptor, leading to all kinds of use-after-free\nexploitation scenarios.\n\nFix this by deferring the call to fd_install() until after the usercopy\nhas succeeded.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48771"
},
{
"category": "external",
"summary": "RHBZ#2293337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293337"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48771",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48771"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062011-CVE-2022-48771-2c90@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062011-CVE-2022-48771-2c90@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy"
},
{
"cve": "CVE-2022-48904",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2024-08-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2307157"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix I/O page table memory leak\n\nThe current logic updates the I/O page table mode for the domain\nbefore calling the logic to free memory used for the page table.\nThis results in IOMMU page table memory leak, and can be observed\nwhen launching VM w/ pass-through devices.\n\nFix by freeing the memory used for page table before updating the mode.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iommu/amd: Fix I/O page table memory leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.6 and above (including RHEL 8.10)\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) iommu/amd: Fix I/O page table memory leak\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48904"
},
{
"category": "external",
"summary": "RHBZ#2307157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307157"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48904"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48904-b02c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48904-b02c@gregkh/T"
}
],
"release_date": "2024-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iommu/amd: Fix I/O page table memory leak"
},
{
"cve": "CVE-2023-0459",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216383"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Copy_from_user on 64-bit versions may leak kernel information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "RHBZ#2216383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c",
"url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"
}
],
"release_date": "2020-02-15T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Copy_from_user on 64-bit versions may leak kernel information"
}
]
}
RHSA-2022:1975
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1975",
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "1903578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903578"
},
{
"category": "external",
"summary": "1905749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905749"
},
{
"category": "external",
"summary": "1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1975.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T02:13:17+00:00",
"generator": {
"date": "2025-10-10T02:13:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1975",
"initial_release_date": "2022-05-10T13:43:14+00:00",
"revision_history": [
{
"date": "2022-05-10T13:43:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:43:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T02:13:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0404",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919791"
}
],
"notes": [
{
"category": "description",
"text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: avoid cyclic entity chains due to malformed USB descriptors",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0404"
},
{
"category": "external",
"summary": "RHBZ#1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: avoid cyclic entity chains due to malformed USB descriptors"
},
{
"cve": "CVE-2020-13974",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016169"
}
],
"notes": [
{
"category": "description",
"text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13974"
},
{
"category": "external",
"summary": "RHBZ#2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13974"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"
}
],
"release_date": "2020-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c"
},
{
"acknowledgments": [
{
"names": [
"Jeremy Cline"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-27820",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901726"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in nouveau kernel module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27820"
},
{
"category": "external",
"summary": "RHBZ#1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"
}
],
"release_date": "2020-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: use-after-free in nouveau kernel module"
},
{
"cve": "CVE-2021-0941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018205"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "RHBZ#2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941"
},
{
"category": "external",
"summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0",
"url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free"
},
{
"acknowledgments": [
{
"names": [
"Murray McAllister"
]
}
],
"cve": "CVE-2021-3612",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974079"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "RHBZ#1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
}
],
"release_date": "2021-06-20T12:28:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()"
},
{
"cve": "CVE-2021-3669",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986473"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3669"
},
{
"category": "external",
"summary": "RHBZ#1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669"
}
],
"release_date": "2021-08-02T06:02:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-3743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997961"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3743"
},
{
"category": "external",
"summary": "RHBZ#1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"
},
{
"category": "external",
"summary": "https://lists.openwall.net/netdev/2021/08/17/124",
"url": "https://lists.openwall.net/netdev/2021/08/17/124"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c"
},
{
"cve": "CVE-2021-3744",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "RHBZ#2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744"
},
{
"category": "external",
"summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0",
"url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
},
{
"acknowledgments": [
{
"names": [
"Likang Luo"
],
"organization": "NSFOCUS Security Team"
}
],
"cve": "CVE-2021-3752",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999544"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible use-after-free in bluetooth module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "RHBZ#1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4",
"url": "https://www.openwall.com/lists/oss-security/2021/09/15/4"
}
],
"release_date": "2021-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible use-after-free in bluetooth module"
},
{
"acknowledgments": [
{
"names": [
"Yutian Yang"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999675"
}
],
"notes": [
{
"category": "description",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "RHBZ#1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/",
"url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"
}
],
"release_date": "2021-07-15T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks"
},
{
"cve": "CVE-2021-3764",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997467"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in ccp_run_aes_gcm_cmd() function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "RHBZ#1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"
}
],
"release_date": "2021-08-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in ccp_run_aes_gcm_cmd() function"
},
{
"cve": "CVE-2021-3772",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2021-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000694"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "RHBZ#2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772"
}
],
"release_date": "2021-09-08T06:38:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations"
},
{
"cve": "CVE-2021-3773",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3773"
},
{
"category": "external",
"summary": "RHBZ#2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773"
}
],
"release_date": "2021-09-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients"
},
{
"acknowledgments": [
{
"names": [
"elijahbai, jitxie, huntazhang."
]
}
],
"cve": "CVE-2021-3923",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2019643"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack information leak in infiniband RDMA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3923"
},
{
"category": "external",
"summary": "RHBZ#2019643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923"
}
],
"release_date": "2021-12-01T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack information leak in infiniband RDMA"
},
{
"cve": "CVE-2021-4002",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025726"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible leak or coruption of data residing on hugetlbfs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4002"
},
{
"category": "external",
"summary": "RHBZ#2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/11/25/1"
}
],
"release_date": "2021-11-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible leak or coruption of data residing on hugetlbfs"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027239"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security regression for CVE-2018-13405",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "RHBZ#2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"
}
],
"release_date": "2021-09-16T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security regression for CVE-2018-13405"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2021-4093",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2028584"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4093"
},
{
"category": "external",
"summary": "RHBZ#2028584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"
}
],
"release_date": "2021-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io"
},
{
"cve": "CVE-2021-4157",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034342"
}
],
"notes": [
{
"category": "description",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overwrite in decode_nfs_fh function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "RHBZ#2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"
}
],
"release_date": "2021-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer overwrite in decode_nfs_fh function"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Keyu Man, Xin\u0027an Zhou and Zhiyun Qian"
],
"organization": "University of California, Riverside"
}
],
"cve": "CVE-2021-20322",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2014230"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "RHBZ#2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43"
}
],
"release_date": "2021-08-26T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26401",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26401"
},
{
"category": "external",
"summary": "RHBZ#2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "AMD recommends mitigation that uses generic retpoline.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-37159",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1985353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "RHBZ#1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159"
},
{
"category": "external",
"summary": "https://www.spinics.net/lists/linux-usb/msg202228.html",
"url": "https://www.spinics.net/lists/linux-usb/msg202228.html"
}
],
"release_date": "2020-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c"
},
{
"cve": "CVE-2021-41864",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2010463"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "RHBZ#2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a",
"url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"
}
],
"release_date": "2021-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write"
},
{
"cve": "CVE-2021-42739",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951739"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap buffer overflow in firedtv driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "RHBZ#1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/",
"url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"
}
],
"release_date": "2021-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Heap buffer overflow in firedtv driver"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-43389",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2013180"
}
],
"notes": [
{
"category": "description",
"text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "RHBZ#2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
}
],
"release_date": "2021-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c"
},
{
"cve": "CVE-2021-43976",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025003"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "RHBZ#2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976"
},
{
"category": "external",
"summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/",
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"
}
],
"release_date": "2021-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device"
},
{
"acknowledgments": [
{
"names": [
"Patrik Lantz"
],
"organization": "axis.com"
}
],
"cve": "CVE-2021-44733",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030747"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in the TEE subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44733"
},
{
"category": "external",
"summary": "RHBZ#2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/",
"url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"
}
],
"release_date": "2021-12-14T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in the TEE subsystem"
},
{
"cve": "CVE-2021-45485",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039911"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv6 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45485"
},
{
"category": "external",
"summary": "RHBZ#2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/",
"url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"
}
],
"release_date": "2021-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv6 implementation"
},
{
"cve": "CVE-2021-45486",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039914"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv4 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45486"
},
{
"category": "external",
"summary": "RHBZ#2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2112.09604.pdf",
"url": "https://arxiv.org/pdf/2112.09604.pdf"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"
}
],
"release_date": "2021-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv4 implementation"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2021-47556",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283393"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47556"
},
{
"category": "external",
"summary": "RHBZ#2283393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()"
},
{
"cve": "CVE-2021-47590",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293237"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47590"
},
{
"category": "external",
"summary": "RHBZ#2293237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()"
},
{
"cve": "CVE-2021-47614",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293265"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s RDMA/irdma driver. Improper memory management in the add_pble_prm function fails to manage memory correctly, resulting in a user-after-free condition that can lead to exploitation. This flaw allows an attacker to manipulate memory access potentially, resulting in data corruption or system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47614"
},
{
"category": "external",
"summary": "RHBZ#2293265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0001",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061712"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Branch History Injection (BHI)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0001"
},
{
"category": "external",
"summary": "RHBZ#2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Branch History Injection (BHI)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0002",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061721"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Intra-Mode BTI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0002"
},
{
"category": "external",
"summary": "RHBZ#2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Intra-Mode BTI"
},
{
"acknowledgments": [
{
"names": [
"De4dCr0w"
],
"organization": "360 Vulnerability Research Institute"
}
],
"cve": "CVE-2022-0286",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037019"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local denial of service in bond_ipsec_add_sa",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0286"
},
{
"category": "external",
"summary": "RHBZ#2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"
}
],
"release_date": "2021-07-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local denial of service in bond_ipsec_add_sa"
},
{
"cve": "CVE-2022-0322",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2021-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0322"
},
{
"category": "external",
"summary": "RHBZ#2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"
}
],
"release_date": "2021-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060606"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in copy_page_to_iter() in iov_iter.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0850"
},
{
"category": "external",
"summary": "RHBZ#2060606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8",
"url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"
}
],
"release_date": "2021-05-06T19:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in copy_page_to_iter() in iov_iter.c"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi",
"Jann Horn"
]
}
],
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064855"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "RHBZ#2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"
}
],
"release_date": "2022-03-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3105",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153067"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3105"
},
{
"category": "external",
"summary": "RHBZ#2153067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3106",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153066"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3106"
},
{
"category": "external",
"summary": "RHBZ#2153066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3108",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153052"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3108"
},
{
"category": "external",
"summary": "RHBZ#2153052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()"
},
{
"cve": "CVE-2023-0459",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216383"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Copy_from_user on 64-bit versions may leak kernel information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "RHBZ#2216383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c",
"url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"
}
],
"release_date": "2020-02-15T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Copy_from_user on 64-bit versions may leak kernel information"
},
{
"cve": "CVE-2023-3022",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2023-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2211440"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3022"
},
{
"category": "external",
"summary": "RHBZ#2211440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
}
],
"release_date": "2019-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails"
}
]
}
rhsa-2022_1975
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1975",
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "1903578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903578"
},
{
"category": "external",
"summary": "1905749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905749"
},
{
"category": "external",
"summary": "1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1975.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2024-11-15T17:12:25+00:00",
"generator": {
"date": "2024-11-15T17:12:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2022:1975",
"initial_release_date": "2022-05-10T13:43:14+00:00",
"revision_history": [
{
"date": "2022-05-10T13:43:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:43:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-15T17:12:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0404",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919791"
}
],
"notes": [
{
"category": "description",
"text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: avoid cyclic entity chains due to malformed USB descriptors",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0404"
},
{
"category": "external",
"summary": "RHBZ#1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: avoid cyclic entity chains due to malformed USB descriptors"
},
{
"cve": "CVE-2020-13974",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016169"
}
],
"notes": [
{
"category": "description",
"text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13974"
},
{
"category": "external",
"summary": "RHBZ#2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13974"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"
}
],
"release_date": "2020-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c"
},
{
"acknowledgments": [
{
"names": [
"Jeremy Cline"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-27820",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901726"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in nouveau kernel module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27820"
},
{
"category": "external",
"summary": "RHBZ#1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"
}
],
"release_date": "2020-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: use-after-free in nouveau kernel module"
},
{
"cve": "CVE-2021-0941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018205"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "RHBZ#2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941"
},
{
"category": "external",
"summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0",
"url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free"
},
{
"acknowledgments": [
{
"names": [
"Murray McAllister"
]
}
],
"cve": "CVE-2021-3612",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974079"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "RHBZ#1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
}
],
"release_date": "2021-06-20T12:28:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()"
},
{
"cve": "CVE-2021-3669",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986473"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3669"
},
{
"category": "external",
"summary": "RHBZ#1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669"
}
],
"release_date": "2021-08-02T06:02:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-3743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997961"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3743"
},
{
"category": "external",
"summary": "RHBZ#1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"
},
{
"category": "external",
"summary": "https://lists.openwall.net/netdev/2021/08/17/124",
"url": "https://lists.openwall.net/netdev/2021/08/17/124"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c"
},
{
"cve": "CVE-2021-3744",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "RHBZ#2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744"
},
{
"category": "external",
"summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0",
"url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
},
{
"acknowledgments": [
{
"names": [
"Likang Luo"
],
"organization": "NSFOCUS Security Team"
}
],
"cve": "CVE-2021-3752",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999544"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible use-after-free in bluetooth module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "RHBZ#1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4",
"url": "https://www.openwall.com/lists/oss-security/2021/09/15/4"
}
],
"release_date": "2021-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible use-after-free in bluetooth module"
},
{
"acknowledgments": [
{
"names": [
"Yutian Yang"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999675"
}
],
"notes": [
{
"category": "description",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "RHBZ#1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/",
"url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"
}
],
"release_date": "2021-07-15T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks"
},
{
"cve": "CVE-2021-3764",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997467"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in ccp_run_aes_gcm_cmd() function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "RHBZ#1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"
}
],
"release_date": "2021-08-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in ccp_run_aes_gcm_cmd() function"
},
{
"cve": "CVE-2021-3772",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2021-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000694"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "RHBZ#2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772"
}
],
"release_date": "2021-09-08T06:38:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations"
},
{
"cve": "CVE-2021-3773",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3773"
},
{
"category": "external",
"summary": "RHBZ#2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773"
}
],
"release_date": "2021-09-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients"
},
{
"acknowledgments": [
{
"names": [
"elijahbai, jitxie, huntazhang."
]
}
],
"cve": "CVE-2021-3923",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2019643"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack information leak in infiniband RDMA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3923"
},
{
"category": "external",
"summary": "RHBZ#2019643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923"
}
],
"release_date": "2021-12-01T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack information leak in infiniband RDMA"
},
{
"cve": "CVE-2021-4002",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025726"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible leak or coruption of data residing on hugetlbfs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4002"
},
{
"category": "external",
"summary": "RHBZ#2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/11/25/1"
}
],
"release_date": "2021-11-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible leak or coruption of data residing on hugetlbfs"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027239"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security regression for CVE-2018-13405",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "RHBZ#2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"
}
],
"release_date": "2021-09-16T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security regression for CVE-2018-13405"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2021-4093",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2028584"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4093"
},
{
"category": "external",
"summary": "RHBZ#2028584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"
}
],
"release_date": "2021-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io"
},
{
"cve": "CVE-2021-4157",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034342"
}
],
"notes": [
{
"category": "description",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overwrite in decode_nfs_fh function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "RHBZ#2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"
}
],
"release_date": "2021-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer overwrite in decode_nfs_fh function"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Keyu Man, Xin\u0027an Zhou and Zhiyun Qian"
],
"organization": "University of California, Riverside"
}
],
"cve": "CVE-2021-20322",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2014230"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "RHBZ#2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43"
}
],
"release_date": "2021-08-26T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26401",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26401"
},
{
"category": "external",
"summary": "RHBZ#2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "AMD recommends mitigation that uses generic retpoline.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-37159",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1985353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "RHBZ#1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159"
},
{
"category": "external",
"summary": "https://www.spinics.net/lists/linux-usb/msg202228.html",
"url": "https://www.spinics.net/lists/linux-usb/msg202228.html"
}
],
"release_date": "2020-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c"
},
{
"cve": "CVE-2021-41864",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2010463"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "RHBZ#2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a",
"url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"
}
],
"release_date": "2021-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write"
},
{
"cve": "CVE-2021-42739",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951739"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap buffer overflow in firedtv driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "RHBZ#1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/",
"url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"
}
],
"release_date": "2021-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Heap buffer overflow in firedtv driver"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-43389",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2013180"
}
],
"notes": [
{
"category": "description",
"text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "RHBZ#2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
}
],
"release_date": "2021-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c"
},
{
"cve": "CVE-2021-43976",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025003"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "RHBZ#2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976"
},
{
"category": "external",
"summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/",
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"
}
],
"release_date": "2021-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device"
},
{
"acknowledgments": [
{
"names": [
"Patrik Lantz"
],
"organization": "axis.com"
}
],
"cve": "CVE-2021-44733",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030747"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in the TEE subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44733"
},
{
"category": "external",
"summary": "RHBZ#2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/",
"url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"
}
],
"release_date": "2021-12-14T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in the TEE subsystem"
},
{
"cve": "CVE-2021-45485",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039911"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv6 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45485"
},
{
"category": "external",
"summary": "RHBZ#2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/",
"url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"
}
],
"release_date": "2021-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv6 implementation"
},
{
"cve": "CVE-2021-45486",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039914"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv4 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45486"
},
{
"category": "external",
"summary": "RHBZ#2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2112.09604.pdf",
"url": "https://arxiv.org/pdf/2112.09604.pdf"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"
}
],
"release_date": "2021-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv4 implementation"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2021-47556",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283393"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47556"
},
{
"category": "external",
"summary": "RHBZ#2283393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()"
},
{
"cve": "CVE-2021-47590",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293237"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47590"
},
{
"category": "external",
"summary": "RHBZ#2293237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()"
},
{
"cve": "CVE-2021-47614",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293265"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/irdma: Fix a user-after-free in add_pble_prm\n\nWhen irdma_hmc_sd_one fails, \u0027chunk\u0027 is freed while its still on the PBLE\ninfo list.\n\nAdd the chunk entry to the PBLE info list only after successful setting of\nthe SD in irdma_hmc_sd_one.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47614"
},
{
"category": "external",
"summary": "RHBZ#2293265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0001",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061712"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Branch History Injection (BHI)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0001"
},
{
"category": "external",
"summary": "RHBZ#2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Branch History Injection (BHI)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0002",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061721"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Intra-Mode BTI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0002"
},
{
"category": "external",
"summary": "RHBZ#2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Intra-Mode BTI"
},
{
"acknowledgments": [
{
"names": [
"De4dCr0w"
],
"organization": "360 Vulnerability Research Institute"
}
],
"cve": "CVE-2022-0286",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037019"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local denial of service in bond_ipsec_add_sa",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0286"
},
{
"category": "external",
"summary": "RHBZ#2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"
}
],
"release_date": "2021-07-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local denial of service in bond_ipsec_add_sa"
},
{
"cve": "CVE-2022-0322",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2021-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0322"
},
{
"category": "external",
"summary": "RHBZ#2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"
}
],
"release_date": "2021-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060606"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in copy_page_to_iter() in iov_iter.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0850"
},
{
"category": "external",
"summary": "RHBZ#2060606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8",
"url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"
}
],
"release_date": "2021-05-06T19:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in copy_page_to_iter() in iov_iter.c"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi",
"Jann Horn"
]
}
],
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064855"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "RHBZ#2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"
}
],
"release_date": "2022-03-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3105",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153067"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3105"
},
{
"category": "external",
"summary": "RHBZ#2153067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3106",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153066"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3106"
},
{
"category": "external",
"summary": "RHBZ#2153066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3108",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153052"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3108"
},
{
"category": "external",
"summary": "RHBZ#2153052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()"
},
{
"cve": "CVE-2023-0459",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216383"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Copy_from_user on 64-bit versions may leak kernel information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "RHBZ#2216383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c",
"url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"
}
],
"release_date": "2020-02-15T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Copy_from_user on 64-bit versions may leak kernel information"
},
{
"cve": "CVE-2023-3022",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2023-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2211440"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3022"
},
{
"category": "external",
"summary": "RHBZ#2211440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
}
],
"release_date": "2019-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails"
}
]
}
rhsa-2022:1988
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1988",
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1888433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888433"
},
{
"category": "external",
"summary": "1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "1957375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957375"
},
{
"category": "external",
"summary": "1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "1978123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978123"
},
{
"category": "external",
"summary": "1981950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981950"
},
{
"category": "external",
"summary": "1983894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983894"
},
{
"category": "external",
"summary": "1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "1994390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994390"
},
{
"category": "external",
"summary": "1997338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997338"
},
{
"category": "external",
"summary": "1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "2009312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009312"
},
{
"category": "external",
"summary": "2009521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009521"
},
{
"category": "external",
"summary": "2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "2011104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011104"
},
{
"category": "external",
"summary": "2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "2015525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015525"
},
{
"category": "external",
"summary": "2015755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015755"
},
{
"category": "external",
"summary": "2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "2017073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017073"
},
{
"category": "external",
"summary": "2017796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017796"
},
{
"category": "external",
"summary": "2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "2022814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022814"
},
{
"category": "external",
"summary": "2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2030476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030476"
},
{
"category": "external",
"summary": "2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "2031200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031200"
},
{
"category": "external",
"summary": "2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "2042798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042798"
},
{
"category": "external",
"summary": "2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "2043453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043453"
},
{
"category": "external",
"summary": "2046021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046021"
},
{
"category": "external",
"summary": "2048251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048251"
},
{
"category": "external",
"summary": "2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1988.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-01T00:53:46+00:00",
"generator": {
"date": "2025-11-01T00:53:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2022:1988",
"initial_release_date": "2022-05-10T13:58:00+00:00",
"revision_history": [
{
"date": "2022-05-10T13:58:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:58:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-01T00:53:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "perf-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "perf-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.s390x",
"product_id": "perf-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.src",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.src",
"product_id": "kernel-0:4.18.0-372.9.1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.9.1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"product_id": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.9.1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.src",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.src",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0404",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919791"
}
],
"notes": [
{
"category": "description",
"text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: avoid cyclic entity chains due to malformed USB descriptors",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0404"
},
{
"category": "external",
"summary": "RHBZ#1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: avoid cyclic entity chains due to malformed USB descriptors"
},
{
"acknowledgments": [
{
"names": [
"Anthony Steinhauser"
],
"organization": "Google\u0027s Safeside Project"
}
],
"cve": "CVE-2020-4788",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1888433"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. IBM Power9 processors can speculatively operate on data stored in the L1 cache before it has been completely validated. The attack has limited access to memory and is only able to access memory normally permissible to the execution context. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: speculation on incompletely validated data on IBM Power9",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-4788"
},
{
"category": "external",
"summary": "RHBZ#1888433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888433"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-4788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-4788"
},
{
"category": "external",
"summary": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189296",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189296"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc",
"url": "https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/20/3",
"url": "https://www.openwall.com/lists/oss-security/2020/11/20/3"
}
],
"release_date": "2020-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: speculation on incompletely validated data on IBM Power9"
},
{
"cve": "CVE-2020-13974",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016169"
}
],
"notes": [
{
"category": "description",
"text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13974"
},
{
"category": "external",
"summary": "RHBZ#2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13974"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"
}
],
"release_date": "2020-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c"
},
{
"acknowledgments": [
{
"names": [
"Jeremy Cline"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-27820",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901726"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in nouveau kernel module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27820"
},
{
"category": "external",
"summary": "RHBZ#1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"
}
],
"release_date": "2020-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: use-after-free in nouveau kernel module"
},
{
"cve": "CVE-2021-0941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018205"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "RHBZ#2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941"
},
{
"category": "external",
"summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0",
"url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free"
},
{
"acknowledgments": [
{
"names": [
"Murray McAllister"
]
}
],
"cve": "CVE-2021-3612",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974079"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "RHBZ#1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
}
],
"release_date": "2021-06-20T12:28:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()"
},
{
"cve": "CVE-2021-3669",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986473"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3669"
},
{
"category": "external",
"summary": "RHBZ#1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669"
}
],
"release_date": "2021-08-02T06:02:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-3743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997961"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3743"
},
{
"category": "external",
"summary": "RHBZ#1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"
},
{
"category": "external",
"summary": "https://lists.openwall.net/netdev/2021/08/17/124",
"url": "https://lists.openwall.net/netdev/2021/08/17/124"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c"
},
{
"cve": "CVE-2021-3744",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "RHBZ#2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744"
},
{
"category": "external",
"summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0",
"url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
},
{
"acknowledgments": [
{
"names": [
"Likang Luo"
],
"organization": "NSFOCUS Security Team"
}
],
"cve": "CVE-2021-3752",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999544"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible use-after-free in bluetooth module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "RHBZ#1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4",
"url": "https://www.openwall.com/lists/oss-security/2021/09/15/4"
}
],
"release_date": "2021-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible use-after-free in bluetooth module"
},
{
"acknowledgments": [
{
"names": [
"Yutian Yang"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999675"
}
],
"notes": [
{
"category": "description",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "RHBZ#1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/",
"url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"
}
],
"release_date": "2021-07-15T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks"
},
{
"cve": "CVE-2021-3764",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997467"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in ccp_run_aes_gcm_cmd() function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "RHBZ#1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"
}
],
"release_date": "2021-08-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in ccp_run_aes_gcm_cmd() function"
},
{
"cve": "CVE-2021-3772",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2021-08-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000694"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "RHBZ#2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772"
}
],
"release_date": "2021-09-08T06:38:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations"
},
{
"cve": "CVE-2021-3773",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3773"
},
{
"category": "external",
"summary": "RHBZ#2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773"
}
],
"release_date": "2021-09-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients"
},
{
"acknowledgments": [
{
"names": [
"elijahbai, jitxie, huntazhang."
]
}
],
"cve": "CVE-2021-3923",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2019643"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack information leak in infiniband RDMA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3923"
},
{
"category": "external",
"summary": "RHBZ#2019643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923"
}
],
"release_date": "2021-12-01T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack information leak in infiniband RDMA"
},
{
"cve": "CVE-2021-4002",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025726"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible leak or coruption of data residing on hugetlbfs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4002"
},
{
"category": "external",
"summary": "RHBZ#2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/11/25/1"
}
],
"release_date": "2021-11-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible leak or coruption of data residing on hugetlbfs"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027239"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security regression for CVE-2018-13405",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "RHBZ#2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"
}
],
"release_date": "2021-09-16T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security regression for CVE-2018-13405"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2021-4093",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2028584"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4093"
},
{
"category": "external",
"summary": "RHBZ#2028584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"
}
],
"release_date": "2021-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io"
},
{
"cve": "CVE-2021-4157",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034342"
}
],
"notes": [
{
"category": "description",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overwrite in decode_nfs_fh function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "RHBZ#2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"
}
],
"release_date": "2021-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer overwrite in decode_nfs_fh function"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Keyu Man, Xin\u0027an Zhou and Zhiyun Qian"
],
"organization": "University of California, Riverside"
}
],
"cve": "CVE-2021-20322",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2014230"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "RHBZ#2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43"
}
],
"release_date": "2021-08-26T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies"
},
{
"cve": "CVE-2021-21781",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-07-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981950"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw exists in the ARM SIGPAGE functionality of the Linux kernel. An attacker with a local account can read the contents of the sigpage, which contains previously initialized kernel memory contents. This flaw requires an attacker to read a process\u2019s memory at a specific offset to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: arm: SIGPAGE information disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21781"
},
{
"category": "external",
"summary": "RHBZ#1981950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981950"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21781"
},
{
"category": "external",
"summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243"
}
],
"release_date": "2021-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: arm: SIGPAGE information disclosure vulnerability"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26401",
"discovery_date": "2022-03-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26401"
},
{
"category": "external",
"summary": "RHBZ#2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "AMD recommends mitigation that uses generic retpoline.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-37159",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1985353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "RHBZ#1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159"
},
{
"category": "external",
"summary": "https://www.spinics.net/lists/linux-usb/msg202228.html",
"url": "https://www.spinics.net/lists/linux-usb/msg202228.html"
}
],
"release_date": "2020-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c"
},
{
"cve": "CVE-2021-40490",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-09-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2001951"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A race condition was discovered in the ext4 subsystem. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is actual only if inline_data enabled for the ext4 partition, and by default it is disabled.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-40490"
},
{
"category": "external",
"summary": "RHBZ#2001951",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001951"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40490"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa"
}
],
"release_date": "2021-09-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem"
},
{
"cve": "CVE-2021-41864",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2010463"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "RHBZ#2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a",
"url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"
}
],
"release_date": "2021-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write"
},
{
"cve": "CVE-2021-42739",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951739"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap buffer overflow in firedtv driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "RHBZ#1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/",
"url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"
}
],
"release_date": "2021-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Heap buffer overflow in firedtv driver"
},
{
"cve": "CVE-2021-43056",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017073"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service problem was found in the Linux kernel\u0027s Kernel-based Virtual Machine (KVM) specific to PowerPC. In this flaw, a user with local access can confuse the host offline code, causing the guest to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ppc: kvm: allows a malicious KVM guest to crash the host",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43056"
},
{
"category": "external",
"summary": "RHBZ#2017073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43056"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337"
}
],
"release_date": "2021-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ppc: kvm: allows a malicious KVM guest to crash the host"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-43389",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2013180"
}
],
"notes": [
{
"category": "description",
"text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "RHBZ#2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
}
],
"release_date": "2021-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c"
},
{
"cve": "CVE-2021-43976",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025003"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "RHBZ#2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976"
},
{
"category": "external",
"summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/",
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"
}
],
"release_date": "2021-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device"
},
{
"acknowledgments": [
{
"names": [
"Patrik Lantz"
],
"organization": "axis.com"
}
],
"cve": "CVE-2021-44733",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030747"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in the TEE subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44733"
},
{
"category": "external",
"summary": "RHBZ#2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/",
"url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"
}
],
"release_date": "2021-12-14T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in the TEE subsystem"
},
{
"cve": "CVE-2021-45485",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039911"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv6 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45485"
},
{
"category": "external",
"summary": "RHBZ#2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/",
"url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"
}
],
"release_date": "2021-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv6 implementation"
},
{
"cve": "CVE-2021-45486",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039914"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv4 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45486"
},
{
"category": "external",
"summary": "RHBZ#2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2112.09604.pdf",
"url": "https://arxiv.org/pdf/2112.09604.pdf"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"
}
],
"release_date": "2021-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv4 implementation"
},
{
"cve": "CVE-2021-47076",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267525"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Return CQE error if invalid lkey was supplied\n\nRXE is missing update of WQE status in LOCAL_WRITE failures. This caused\nthe following kernel panic if someone sent an atomic operation with an\nexplicitly wrong lkey.\n\n[leonro@vm ~]$ mkt test\ntest_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ...\n WARNING: CPU: 5 PID: 263 at drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Modules linked in: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core\n CPU: 5 PID: 263 Comm: python3 Not tainted 5.13.0-rc1+ #2936\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Code: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 00 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff \u003c0f\u003e 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 00 00 e9 ab e7 ff\n RSP: 0018:ffff8880158af090 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652\n RDX: 1ffff9200004b442 RSI: 0000000000000004 RDI: ffffc9000025a210\n RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b\n R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff88800f3b63e8\n R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c\n FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0xb11/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_responder+0x5532/0x7620 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0x9c8/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_requester+0x1efd/0x58c0 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_post_send+0x998/0x1860 [rdma_rxe]\n ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs]\n ib_uverbs_write+0x847/0xc80 [ib_uverbs]\n vfs_write+0x1c5/0x840\n ksys_write+0x176/0x1d0\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47076"
},
{
"category": "external",
"summary": "RHBZ#2267525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267525"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47076"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u"
}
],
"release_date": "2024-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied"
},
{
"cve": "CVE-2021-47178",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271461"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: core: Avoid smp_processor_id() in preemptible code\n\nThe BUG message \"BUG: using smp_processor_id() in preemptible [00000000]\ncode\" was observed for TCMU devices with kernel config DEBUG_PREEMPT.\n\nThe message was observed when blktests block/005 was run on TCMU devices\nwith fileio backend or user:zbc backend [1]. The commit 1130b499b4a7\n(\"scsi: target: tcm_loop: Use LIO wq cmd submission helper\") triggered the\nsymptom. The commit modified work queue to handle commands and changed\n\u0027current-\u003enr_cpu_allowed\u0027 at smp_processor_id() call.\n\nThe message was also observed at system shutdown when TCMU devices were not\ncleaned up [2]. The function smp_processor_id() was called in SCSI host\nwork queue for abort handling, and triggered the BUG message. This symptom\nwas observed regardless of the commit 1130b499b4a7 (\"scsi: target:\ntcm_loop: Use LIO wq cmd submission helper\").\n\nTo avoid the preemptible code check at smp_processor_id(), get CPU ID with\nraw_smp_processor_id() instead. The CPU ID is used for performance\nimprovement then thread move to other CPU will not affect the code.\n\n[1]\n\n[ 56.468103] run blktests block/005 at 2021-05-12 14:16:38\n[ 57.369473] check_preemption_disabled: 85 callbacks suppressed\n[ 57.369480] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1511\n[ 57.369506] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1510\n[ 57.369512] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1506\n[ 57.369552] caller is __target_init_cmd+0x157/0x170 [target_core_mod]\n[ 57.369606] CPU: 4 PID: 1506 Comm: fio Not tainted 5.13.0-rc1+ #34\n[ 57.369613] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018\n[ 57.369617] Call Trace:\n[ 57.369621] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1507\n[ 57.369628] dump_stack+0x6d/0x89\n[ 57.369642] check_preemption_disabled+0xc8/0xd0\n[ 57.369628] caller is __target_init_cmd+0x157/0x170 [target_core_mod]\n[ 57.369655] __target_init_cmd+0x157/0x170 [target_core_mod]\n[ 57.369695] target_init_cmd+0x76/0x90 [target_core_mod]\n[ 57.369732] tcm_loop_queuecommand+0x109/0x210 [tcm_loop]\n[ 57.369744] scsi_queue_rq+0x38e/0xc40\n[ 57.369761] __blk_mq_try_issue_directly+0x109/0x1c0\n[ 57.369779] blk_mq_try_issue_directly+0x43/0x90\n[ 57.369790] blk_mq_submit_bio+0x4e5/0x5d0\n[ 57.369812] submit_bio_noacct+0x46e/0x4e0\n[ 57.369830] __blkdev_direct_IO_simple+0x1a3/0x2d0\n[ 57.369859] ? set_init_blocksize.isra.0+0x60/0x60\n[ 57.369880] generic_file_read_iter+0x89/0x160\n[ 57.369898] blkdev_read_iter+0x44/0x60\n[ 57.369906] new_sync_read+0x102/0x170\n[ 57.369929] vfs_read+0xd4/0x160\n[ 57.369941] __x64_sys_pread64+0x6e/0xa0\n[ 57.369946] ? lockdep_hardirqs_on+0x79/0x100\n[ 57.369958] do_syscall_64+0x3a/0x70\n[ 57.369965] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 57.369973] RIP: 0033:0x7f7ed4c1399f\n[ 57.369979] Code: 08 89 3c 24 48 89 4c 24 18 e8 7d f3 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 11 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 cd f3 ff ff 48 8b\n[ 57.369983] RSP: 002b:00007ffd7918c580 EFLAGS: 00000293 ORIG_RAX: 0000000000000011\n[ 57.369990] RAX: ffffffffffffffda RBX: 00000000015b4540 RCX: 00007f7ed4c1399f\n[ 57.369993] RDX: 0000000000001000 RSI: 00000000015de000 RDI: 0000000000000009\n[ 57.369996] RBP: 00000000015b4540 R08: 0000000000000000 R09: 0000000000000001\n[ 57.369999] R10: 0000000000e5c000 R11: 0000000000000293 R12: 00007f7eb5269a70\n[ 57.370002] R13: 0000000000000000 R14: 0000000000001000 R15: 00000000015b4568\n[ 57.370031] CPU: 7 PID: 1507 Comm: fio Not tainted 5.13.0-rc1+ #34\n[ 57.370036] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018\n[ 57.370039] Call Trace:\n[ 57.370045] dump_stack+0x6d/0x89\n[ 57.370056] ch\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: target: core: Avoid smp_processor_id() in preemptible code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47178"
},
{
"category": "external",
"summary": "RHBZ#2271461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47178"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47178",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47178"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024032538-CVE-2021-47178-6167@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024032538-CVE-2021-47178-6167@gregkh/T"
}
],
"release_date": "2024-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: target: core: Avoid smp_processor_id() in preemptible code"
},
{
"cve": "CVE-2021-47203",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2274634"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel while parsing the txq list in the lpfc_drain_txq() function. Due to improper handling of a local fail message string which is set when a job fails and is never unset for subsequent jobs, this issue can lead to list corruption as jobs may be added to both the txq and the completions list. This could result in system instability or inconsistencies.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.6 and above (including 8.10):\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()\n\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47203"
},
{
"category": "external",
"summary": "RHBZ#2274634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274634"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47203"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47203-ff72@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47203-ff72@gregkh/T"
}
],
"release_date": "2024-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()"
},
{
"cve": "CVE-2021-47301",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282482"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s igb driver. During a reset operation, the driver could access memory that had already been freed. If the driver attempts to use this freed memory, it can lead to a system crash or instability because the memory may no longer be valid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: igb: Fix use-after-free error during reset",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a Moderate severity because the issue primarily impacts system stability by potentially causing a crash if the driver interacts with freed memory. It does not expose sensitive information or allow unauthorized access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47301"
},
{
"category": "external",
"summary": "RHBZ#2282482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47301"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47301",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47301"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052126-CVE-2021-47301-13b4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052126-CVE-2021-47301-13b4@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: igb: Fix use-after-free error during reset"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"cve": "CVE-2021-47498",
"cwe": {
"id": "CWE-399",
"name": "CWE-399"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282917"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm rq: don\u0027t queue request to blk-mq during DM suspend\n\nDM uses blk-mq\u0027s quiesce/unquiesce to stop/start device mapper queue.\n\nBut blk-mq\u0027s unquiesce may come from outside events, such as elevator\nswitch, updating nr_requests or others, and request may come during\nsuspend, so simply ask for blk-mq to requeue it.\n\nFixes one kernel panic issue when running updating nr_requests and\ndm-mpath suspend/resume stress test.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm rq: don\u0027t queue request to blk-mq during DM suspend",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.6 and above (including 8.10):\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) dm rq: don\u0027t queue request to blk-mq during DM suspend\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47498"
},
{
"category": "external",
"summary": "RHBZ#2282917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282917"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47498",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47498"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052243-CVE-2021-47498-dc02@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052243-CVE-2021-47498-dc02@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm rq: don\u0027t queue request to blk-mq during DM suspend"
},
{
"cve": "CVE-2021-47501",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283453"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL pointer dereference in i40e_dbg_dump_desc\n\nWhen trying to dump VFs VSI RX/TX descriptors\nusing debugfs there was a crash\ndue to NULL pointer dereference in i40e_dbg_dump_desc.\nAdded a check to i40e_dbg_dump_desc that checks if\nVSI type is correct for dumping RX/TX descriptors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47501"
},
{
"category": "external",
"summary": "RHBZ#2283453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47501"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2021-47556",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283393"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47556"
},
{
"category": "external",
"summary": "RHBZ#2283393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()"
},
{
"cve": "CVE-2021-47590",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293237"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47590"
},
{
"category": "external",
"summary": "RHBZ#2293237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()"
},
{
"cve": "CVE-2021-47614",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293265"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s RDMA/irdma driver. Improper memory management in the add_pble_prm function fails to manage memory correctly, resulting in a user-after-free condition that can lead to exploitation. This flaw allows an attacker to manipulate memory access potentially, resulting in data corruption or system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47614"
},
{
"category": "external",
"summary": "RHBZ#2293265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0001",
"discovery_date": "2022-03-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061712"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Branch History Injection (BHI)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0001"
},
{
"category": "external",
"summary": "RHBZ#2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Branch History Injection (BHI)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0002",
"discovery_date": "2022-03-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061721"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Intra-Mode BTI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0002"
},
{
"category": "external",
"summary": "RHBZ#2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Intra-Mode BTI"
},
{
"acknowledgments": [
{
"names": [
"De4dCr0w"
],
"organization": "360 Vulnerability Research Institute"
}
],
"cve": "CVE-2022-0286",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037019"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local denial of service in bond_ipsec_add_sa",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0286"
},
{
"category": "external",
"summary": "RHBZ#2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"
}
],
"release_date": "2021-07-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local denial of service in bond_ipsec_add_sa"
},
{
"cve": "CVE-2022-0322",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2021-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0322"
},
{
"category": "external",
"summary": "RHBZ#2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"
}
],
"release_date": "2021-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060606"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in copy_page_to_iter() in iov_iter.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0850"
},
{
"category": "external",
"summary": "RHBZ#2060606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8",
"url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"
}
],
"release_date": "2021-05-06T19:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in copy_page_to_iter() in iov_iter.c"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi",
"Jann Horn"
]
}
],
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064855"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "RHBZ#2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"
}
],
"release_date": "2022-03-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3105",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153067"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3105"
},
{
"category": "external",
"summary": "RHBZ#2153067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3106",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153066"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3106"
},
{
"category": "external",
"summary": "RHBZ#2153066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3108",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153052"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3108"
},
{
"category": "external",
"summary": "RHBZ#2153052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()"
},
{
"cve": "CVE-2022-48771",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293337"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability has been identified in the Linux kernel\u0027s VMware graphics driver (vmwgfx) driver. This flaw occurs during the usercopy operation for the fence_rep object. If this operation fails, it can leave a stale (dangling) file descriptor in the system\u0027s file descriptor table. This allows userland processes to reference an invalidated file object, ultimately leading to a use-after-free condition. Successful exploitation of this vulnerability could result in memory corruption, system instability, or a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48771"
},
{
"category": "external",
"summary": "RHBZ#2293337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293337"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48771",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48771"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062011-CVE-2022-48771-2c90@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062011-CVE-2022-48771-2c90@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy"
},
{
"cve": "CVE-2022-48904",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2024-08-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2307157"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix I/O page table memory leak\n\nThe current logic updates the I/O page table mode for the domain\nbefore calling the logic to free memory used for the page table.\nThis results in IOMMU page table memory leak, and can be observed\nwhen launching VM w/ pass-through devices.\n\nFix by freeing the memory used for page table before updating the mode.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iommu/amd: Fix I/O page table memory leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.6 and above (including RHEL 8.10)\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) iommu/amd: Fix I/O page table memory leak\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48904"
},
{
"category": "external",
"summary": "RHBZ#2307157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307157"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48904"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48904-b02c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48904-b02c@gregkh/T"
}
],
"release_date": "2024-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iommu/amd: Fix I/O page table memory leak"
},
{
"cve": "CVE-2022-49227",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347772"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: avoid kernel warning when changing RX ring parameters\n\nCalling ethtool changing the RX ring parameters like this:\n\n $ ethtool -G eth0 rx 1024\n\non igc triggers kernel warnings like this:\n\n[ 225.198467] ------------[ cut here ]------------\n[ 225.198473] Missing unregister, handled but fix driver\n[ 225.198485] WARNING: CPU: 7 PID: 959 at net/core/xdp.c:168\nxdp_rxq_info_reg+0x79/0xd0\n[...]\n[ 225.198601] Call Trace:\n[ 225.198604] \u003cTASK\u003e\n[ 225.198609] igc_setup_rx_resources+0x3f/0xe0 [igc]\n[ 225.198617] igc_ethtool_set_ringparam+0x30e/0x450 [igc]\n[ 225.198626] ethnl_set_rings+0x18a/0x250\n[ 225.198631] genl_family_rcv_msg_doit+0xca/0x110\n[ 225.198637] genl_rcv_msg+0xce/0x1c0\n[ 225.198640] ? rings_prepare_data+0x60/0x60\n[ 225.198644] ? genl_get_cmd+0xd0/0xd0\n[ 225.198647] netlink_rcv_skb+0x4e/0xf0\n[ 225.198652] genl_rcv+0x24/0x40\n[ 225.198655] netlink_unicast+0x20e/0x330\n[ 225.198659] netlink_sendmsg+0x23f/0x480\n[ 225.198663] sock_sendmsg+0x5b/0x60\n[ 225.198667] __sys_sendto+0xf0/0x160\n[ 225.198671] ? handle_mm_fault+0xb2/0x280\n[ 225.198676] ? do_user_addr_fault+0x1eb/0x690\n[ 225.198680] __x64_sys_sendto+0x20/0x30\n[ 225.198683] do_syscall_64+0x38/0x90\n[ 225.198687] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 225.198693] RIP: 0033:0x7f7ae38ac3aa\n\nigc_ethtool_set_ringparam() copies the igc_ring structure but neglects to\nreset the xdp_rxq_info member before calling igc_setup_rx_resources().\nThis in turn calls xdp_rxq_info_reg() with an already registered xdp_rxq_info.\n\nMake sure to unregister the xdp_rxq_info structure first in\nigc_setup_rx_resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: igc: avoid kernel warning when changing RX ring parameters",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49227"
},
{
"category": "external",
"summary": "RHBZ#2347772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49227"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49227-76b1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49227-76b1@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: igc: avoid kernel warning when changing RX ring parameters"
},
{
"cve": "CVE-2022-50131",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373502"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: mcp2221: prevent a buffer overflow in mcp_smbus_write()\n\nSmatch Warning:\ndrivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy()\n\u0027\u0026mcp-\u003etxbuf[5]\u0027 too small (59 vs 255)\ndrivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() \u0027buf\u0027\ntoo small (34 vs 255)\n\nThe \u0027len\u0027 variable can take a value between 0-255 as it can come from\ndata-\u003eblock[0] and it is user data. So add an bound check to prevent a\nbuffer overflow in memcpy().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: mcp2221: prevent a buffer overflow in mcp_smbus_write()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50131"
},
{
"category": "external",
"summary": "RHBZ#2373502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50131"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-50131-4df3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-50131-4df3@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: HID: mcp2221: prevent a buffer overflow in mcp_smbus_write()"
},
{
"cve": "CVE-2022-50475",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401529"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Make sure \"ib_port\" is valid when access sysfs node\n\nThe \"ib_port\" structure must be set before adding the sysfs kobject,\nand reset after removing it, otherwise it may crash when accessing\nthe sysfs node:\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n Mem abort info:\n ESR = 0x96000006\n Exception class = DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n Data abort info:\n ISV = 0, ISS = 0x00000006\n CM = 0, WnR = 0\n user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000e85f5ba5\n [0000000000000050] pgd=0000000848fd9003, pud=000000085b387003, pmd=0000000000000000\n Internal error: Oops: 96000006 [#2] PREEMPT SMP\n Modules linked in: ib_umad(O) mlx5_ib(O) nfnetlink_cttimeout(E) nfnetlink(E) act_gact(E) cls_flower(E) sch_ingress(E) openvswitch(E) nsh(E) nf_nat_ipv6(E) nf_nat_ipv4(E) nf_conncount(E) nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) mst_pciconf(O) ipmi_devintf(E) ipmi_msghandler(E) ipmb_dev_int(OE) mlx5_core(O) mlxfw(O) mlxdevm(O) auxiliary(O) ib_uverbs(O) ib_core(O) mlx_compat(O) psample(E) sbsa_gwdt(E) uio_pdrv_genirq(E) uio(E) mlxbf_pmc(OE) mlxbf_gige(OE) mlxbf_tmfifo(OE) gpio_mlxbf2(OE) pwr_mlxbf(OE) mlx_trio(OE) i2c_mlxbf(OE) mlx_bootctl(OE) bluefield_edac(OE) knem(O) ip_tables(E) ipv6(E) crc_ccitt(E) [last unloaded: mst_pci]\n Process grep (pid: 3372, stack limit = 0x0000000022055c92)\n CPU: 5 PID: 3372 Comm: grep Tainted: G D OE 4.19.161-mlnx.47.gadcd9e3 #1\n Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS BlueField:3.9.2-15-ga2403ab Sep 8 2022\n pstate: 40000005 (nZcv daif -PAN -UAO)\n pc : hw_stat_port_show+0x4c/0x80 [ib_core]\n lr : port_attr_show+0x40/0x58 [ib_core]\n sp : ffff000029f43b50\n x29: ffff000029f43b50 x28: 0000000019375000\n x27: ffff8007b821a540 x26: ffff000029f43e30\n x25: 0000000000008000 x24: ffff000000eaa958\n x23: 0000000000001000 x22: ffff8007a4ce3000\n x21: ffff8007baff8000 x20: ffff8007b9066ac0\n x19: ffff8007bae97578 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000\n x15: 0000000000000000 x14: 0000000000000000\n x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000\n x9 : 0000000000000000 x8 : ffff8007a4ce4000\n x7 : 0000000000000000 x6 : 000000000000003f\n x5 : ffff000000e6a280 x4 : ffff8007a4ce3000\n x3 : 0000000000000000 x2 : aaaaaaaaaaaaaaab\n x1 : ffff8007b9066a10 x0 : ffff8007baff8000\n Call trace:\n hw_stat_port_show+0x4c/0x80 [ib_core]\n port_attr_show+0x40/0x58 [ib_core]\n sysfs_kf_seq_show+0x8c/0x150\n kernfs_seq_show+0x44/0x50\n seq_read+0x1b4/0x45c\n kernfs_fop_read+0x148/0x1d8\n __vfs_read+0x58/0x180\n vfs_read+0x94/0x154\n ksys_read+0x68/0xd8\n __arm64_sys_read+0x28/0x34\n el0_svc_common+0x88/0x18c\n el0_svc_handler+0x78/0x94\n el0_svc+0x8/0xe8\n Code: f2955562 aa1603e4 aa1503e0 f9405683 (f9402861)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/core: Make sure \"ib_port\" is valid when access sysfs node",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue arises because sysfs attribute handlers fail to validate that the ib_port pointer is non-NULL before dereferencing it. When userspace accesses sysfs nodes under /sys/class/infiniband/ (such as port state, capabilities, or statistics), the kernel retrieves the associated port structure. During device removal or port state changes, the port structure can be freed while sysfs nodes still exist. If a sysfs read occurs during or after this removal, the code dereferences a NULL or freed ib_port pointer, causing a kernel crash. This can be triggered by simply reading sysfs attributes while removing or reconfiguring InfiniBand devices.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50475"
},
{
"category": "external",
"summary": "RHBZ#2401529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401529"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50475"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50475-b3ed@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50475-b3ed@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/core: Make sure \"ib_port\" is valid when access sysfs node"
},
{
"cve": "CVE-2022-50510",
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402300"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()\n\narm_smmu_pmu_init() won\u0027t remove the callback added by\ncpuhp_setup_state_multi() when platform_driver_register() failed. Remove\nthe callback by cpuhp_remove_multi_state() in fail path.\n\nSimilar to the handling of arm_ccn_init() in commit 26242b330093 (\"bus:\narm-ccn: Prevent hotplug callback leak\")",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "arm_smmu_pmu_init() added multi-CPU hotplug callbacks but did not remove them on a subsequent platform driver registration failure. The correction removes the registered callbacks in the failure path so that no dangling hotplug handlers remain after an init error.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50510"
},
{
"category": "external",
"summary": "RHBZ#2402300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50510"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2022-50510-c055@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2022-50510-c055@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module arm_smmuv3_pmu from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()"
},
{
"cve": "CVE-2022-50536",
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402257"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix repeated calls to sock_put() when msg has more_data\n\nIn tcp_bpf_send_verdict() redirection, the eval variable is assigned to\n__SK_REDIRECT after the apply_bytes data is sent, if msg has more_data,\nsock_put() will be called multiple times.\n\nWe should reset the eval variable to __SK_NONE every time more_data\nstarts.\n\nThis causes:\n\nIPv4: Attempt to release TCP socket in state 1 00000000b4c925d7\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 5 PID: 4482 at lib/refcount.c:25 refcount_warn_saturate+0x7d/0x110\nModules linked in:\nCPU: 5 PID: 4482 Comm: sockhash_bypass Kdump: loaded Not tainted 6.0.0 #1\nHardware name: Red Hat KVM, BIOS 1.11.0-2.el7 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __tcp_transmit_skb+0xa1b/0xb90\n ? __alloc_skb+0x8c/0x1a0\n ? __kmalloc_node_track_caller+0x184/0x320\n tcp_write_xmit+0x22a/0x1110\n __tcp_push_pending_frames+0x32/0xf0\n do_tcp_sendpages+0x62d/0x640\n tcp_bpf_push+0xae/0x2c0\n tcp_bpf_sendmsg_redir+0x260/0x410\n ? preempt_count_add+0x70/0xa0\n tcp_bpf_send_verdict+0x386/0x4b0\n tcp_bpf_sendmsg+0x21b/0x3b0\n sock_sendmsg+0x58/0x70\n __sys_sendto+0xfa/0x170\n ? xfd_validate_state+0x1d/0x80\n ? switch_fpu_return+0x59/0xe0\n __x64_sys_sendto+0x24/0x30\n do_syscall_64+0x37/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw arises because the verdict state was not reset at boundaries where additional message data arrives, causing the same socket reference to be dropped more than once. The fix resets the internal verdict state when handling continued data, preventing double release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50536"
},
{
"category": "external",
"summary": "RHBZ#2402257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402257"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50536"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50536",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50536"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100754-CVE-2022-50536-baea@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100754-CVE-2022-50536-baea@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module bpf from being loaded.\n Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data"
},
{
"cve": "CVE-2023-0459",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216383"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Copy_from_user on 64-bit versions may leak kernel information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "RHBZ#2216383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c",
"url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"
}
],
"release_date": "2020-02-15T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Copy_from_user on 64-bit versions may leak kernel information"
},
{
"cve": "CVE-2023-53649",
"cwe": {
"id": "CWE-771",
"name": "Missing Reference to Active Allocated Resource"
},
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402214"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf trace: Really free the evsel-\u003epriv area\n\nIn 3cb4d5e00e037c70 (\"perf trace: Free syscall tp fields in\nevsel-\u003epriv\") it only was freeing if strcmp(evsel-\u003etp_format-\u003esystem,\n\"syscalls\") returned zero, while the corresponding initialization of\nevsel-\u003epriv was being performed if it was _not_ zero, i.e. if the tp\nsystem wasn\u0027t \u0027syscalls\u0027.\n\nJust stop looking for that and free it if evsel-\u003epriv was set, which\nshould be equivalent.\n\nAlso use the pre-existing evsel_trace__delete() function.\n\nThis resolves these leaks, detected with:\n\n $ make EXTRA_CFLAGS=\"-fsanitize=address\" BUILD_BPF_SKEL=1 CORESIGHT=1 O=/tmp/build/perf-tools-next -C tools/perf install-bin\n\n =================================================================\n ==481565==ERROR: LeakSanitizer: detected memory leaks\n\n Direct leak of 40 byte(s) in 1 object(s) allocated from:\n #0 0x7f7343cba097 in calloc (/lib64/libasan.so.8+0xba097)\n #1 0x987966 in zalloc (/home/acme/bin/perf+0x987966)\n #2 0x52f9b9 in evsel_trace__new /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:307\n #3 0x52f9b9 in evsel__syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:333\n #4 0x52f9b9 in evsel__init_raw_syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:458\n #5 0x52f9b9 in perf_evsel__raw_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:480\n #6 0x540e8b in trace__add_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3212\n #7 0x540e8b in trace__run /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3891\n #8 0x540e8b in cmd_trace /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:5156\n #9 0x5ef262 in run_builtin /home/acme/git/perf-tools-next/tools/perf/perf.c:323\n #10 0x4196da in handle_internal_command /home/acme/git/perf-tools-next/tools/perf/perf.c:377\n #11 0x4196da in run_argv /home/acme/git/perf-tools-next/tools/perf/perf.c:421\n #12 0x4196da in main /home/acme/git/perf-tools-next/tools/perf/perf.c:537\n #13 0x7f7342c4a50f in __libc_start_call_main (/lib64/libc.so.6+0x2750f)\n\n Direct leak of 40 byte(s) in 1 object(s) allocated from:\n #0 0x7f7343cba097 in calloc (/lib64/libasan.so.8+0xba097)\n #1 0x987966 in zalloc (/home/acme/bin/perf+0x987966)\n #2 0x52f9b9 in evsel_trace__new /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:307\n #3 0x52f9b9 in evsel__syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:333\n #4 0x52f9b9 in evsel__init_raw_syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:458\n #5 0x52f9b9 in perf_evsel__raw_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:480\n #6 0x540dd1 in trace__add_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3205\n #7 0x540dd1 in trace__run /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3891\n #8 0x540dd1 in cmd_trace /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:5156\n #9 0x5ef262 in run_builtin /home/acme/git/perf-tools-next/tools/perf/perf.c:323\n #10 0x4196da in handle_internal_command /home/acme/git/perf-tools-next/tools/perf/perf.c:377\n #11 0x4196da in run_argv /home/acme/git/perf-tools-next/tools/perf/perf.c:421\n #12 0x4196da in main /home/acme/git/perf-tools-next/tools/perf/perf.c:537\n #13 0x7f7342c4a50f in __libc_start_call_main (/lib64/libc.so.6+0x2750f)\n\n SUMMARY: AddressSanitizer: 80 byte(s) leaked in 2 allocation(s).\n [root@quaco ~]#\n\nWith this we plug all leaks with \"perf trace sleep 1\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf trace: Really free the evsel-\u003epriv area",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The perf trace cleanup code contains inverted logic when freeing the evsel-\u003epriv area. Memory is allocated when the tracepoint system is not \"syscalls\", but the cleanup code only frees when it is \"syscalls\", creating a mismatch. This means memory allocated for non-syscall tracepoints is never released, causing a permanent leak with each perf trace invocation. The issue was detected using AddressSanitizer during testing and manifests as 40-byte leaks per event selector. While a single perf trace command leaks relatively small amounts of memory, repeated invocations or long-running trace sessions can accumulate significant memory consumption.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-53649"
},
{
"category": "external",
"summary": "RHBZ#2402214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-53649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53649"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-53649",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53649"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100718-CVE-2023-53649-0a4a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100718-CVE-2023-53649-0a4a@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: perf trace: Really free the evsel-\u003epriv area"
}
]
}
rhsa-2022:1975
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1975",
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "1903578",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903578"
},
{
"category": "external",
"summary": "1905749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1905749"
},
{
"category": "external",
"summary": "1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1975.json"
}
],
"title": "Red Hat Security Advisory: kernel-rt security and bug fix update",
"tracking": {
"current_release_date": "2025-10-10T02:13:17+00:00",
"generator": {
"date": "2025-10-10T02:13:17+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2022:1975",
"initial_release_date": "2022-05-10T13:43:14+00:00",
"revision_history": [
{
"date": "2022-05-10T13:43:14+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:43:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-10T02:13:17+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::nfv"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::realtime"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-core@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-devel@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-kvm@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-modules-extra@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_id": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common-x86_64@4.18.0-372.9.1.rt7.166.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux NFV (v. 8)",
"product_id": "NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "NFV-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64 as a component of Red Hat Enterprise Linux RT (v. 8)",
"product_id": "RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
},
"product_reference": "kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"relates_to_product_reference": "RT-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0404",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919791"
}
],
"notes": [
{
"category": "description",
"text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: avoid cyclic entity chains due to malformed USB descriptors",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0404"
},
{
"category": "external",
"summary": "RHBZ#1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: avoid cyclic entity chains due to malformed USB descriptors"
},
{
"cve": "CVE-2020-13974",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016169"
}
],
"notes": [
{
"category": "description",
"text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13974"
},
{
"category": "external",
"summary": "RHBZ#2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13974"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"
}
],
"release_date": "2020-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c"
},
{
"acknowledgments": [
{
"names": [
"Jeremy Cline"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-27820",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901726"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in nouveau kernel module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27820"
},
{
"category": "external",
"summary": "RHBZ#1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"
}
],
"release_date": "2020-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: use-after-free in nouveau kernel module"
},
{
"cve": "CVE-2021-0941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018205"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "RHBZ#2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941"
},
{
"category": "external",
"summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0",
"url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free"
},
{
"acknowledgments": [
{
"names": [
"Murray McAllister"
]
}
],
"cve": "CVE-2021-3612",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974079"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "RHBZ#1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
}
],
"release_date": "2021-06-20T12:28:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()"
},
{
"cve": "CVE-2021-3669",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986473"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3669"
},
{
"category": "external",
"summary": "RHBZ#1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669"
}
],
"release_date": "2021-08-02T06:02:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-3743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997961"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3743"
},
{
"category": "external",
"summary": "RHBZ#1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"
},
{
"category": "external",
"summary": "https://lists.openwall.net/netdev/2021/08/17/124",
"url": "https://lists.openwall.net/netdev/2021/08/17/124"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c"
},
{
"cve": "CVE-2021-3744",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "RHBZ#2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744"
},
{
"category": "external",
"summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0",
"url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
},
{
"acknowledgments": [
{
"names": [
"Likang Luo"
],
"organization": "NSFOCUS Security Team"
}
],
"cve": "CVE-2021-3752",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999544"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible use-after-free in bluetooth module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "RHBZ#1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4",
"url": "https://www.openwall.com/lists/oss-security/2021/09/15/4"
}
],
"release_date": "2021-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible use-after-free in bluetooth module"
},
{
"acknowledgments": [
{
"names": [
"Yutian Yang"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999675"
}
],
"notes": [
{
"category": "description",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "RHBZ#1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/",
"url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"
}
],
"release_date": "2021-07-15T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks"
},
{
"cve": "CVE-2021-3764",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997467"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in ccp_run_aes_gcm_cmd() function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "RHBZ#1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"
}
],
"release_date": "2021-08-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in ccp_run_aes_gcm_cmd() function"
},
{
"cve": "CVE-2021-3772",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2021-08-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000694"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "RHBZ#2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772"
}
],
"release_date": "2021-09-08T06:38:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations"
},
{
"cve": "CVE-2021-3773",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3773"
},
{
"category": "external",
"summary": "RHBZ#2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773"
}
],
"release_date": "2021-09-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients"
},
{
"acknowledgments": [
{
"names": [
"elijahbai, jitxie, huntazhang."
]
}
],
"cve": "CVE-2021-3923",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2019643"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack information leak in infiniband RDMA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3923"
},
{
"category": "external",
"summary": "RHBZ#2019643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923"
}
],
"release_date": "2021-12-01T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack information leak in infiniband RDMA"
},
{
"cve": "CVE-2021-4002",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025726"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible leak or coruption of data residing on hugetlbfs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4002"
},
{
"category": "external",
"summary": "RHBZ#2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/11/25/1"
}
],
"release_date": "2021-11-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible leak or coruption of data residing on hugetlbfs"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027239"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security regression for CVE-2018-13405",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "RHBZ#2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"
}
],
"release_date": "2021-09-16T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security regression for CVE-2018-13405"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2021-4093",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2028584"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4093"
},
{
"category": "external",
"summary": "RHBZ#2028584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"
}
],
"release_date": "2021-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io"
},
{
"cve": "CVE-2021-4157",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034342"
}
],
"notes": [
{
"category": "description",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overwrite in decode_nfs_fh function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "RHBZ#2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"
}
],
"release_date": "2021-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer overwrite in decode_nfs_fh function"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Keyu Man, Xin\u0027an Zhou and Zhiyun Qian"
],
"organization": "University of California, Riverside"
}
],
"cve": "CVE-2021-20322",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2014230"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "RHBZ#2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43"
}
],
"release_date": "2021-08-26T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26401",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26401"
},
{
"category": "external",
"summary": "RHBZ#2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "AMD recommends mitigation that uses generic retpoline.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-37159",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1985353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "RHBZ#1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159"
},
{
"category": "external",
"summary": "https://www.spinics.net/lists/linux-usb/msg202228.html",
"url": "https://www.spinics.net/lists/linux-usb/msg202228.html"
}
],
"release_date": "2020-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c"
},
{
"cve": "CVE-2021-41864",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2010463"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "RHBZ#2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a",
"url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"
}
],
"release_date": "2021-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write"
},
{
"cve": "CVE-2021-42739",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951739"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap buffer overflow in firedtv driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "RHBZ#1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/",
"url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"
}
],
"release_date": "2021-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Heap buffer overflow in firedtv driver"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-43389",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2013180"
}
],
"notes": [
{
"category": "description",
"text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "RHBZ#2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
}
],
"release_date": "2021-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c"
},
{
"cve": "CVE-2021-43976",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025003"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "RHBZ#2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976"
},
{
"category": "external",
"summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/",
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"
}
],
"release_date": "2021-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device"
},
{
"acknowledgments": [
{
"names": [
"Patrik Lantz"
],
"organization": "axis.com"
}
],
"cve": "CVE-2021-44733",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030747"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in the TEE subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44733"
},
{
"category": "external",
"summary": "RHBZ#2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/",
"url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"
}
],
"release_date": "2021-12-14T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in the TEE subsystem"
},
{
"cve": "CVE-2021-45485",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039911"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv6 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45485"
},
{
"category": "external",
"summary": "RHBZ#2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/",
"url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"
}
],
"release_date": "2021-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv6 implementation"
},
{
"cve": "CVE-2021-45486",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039914"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv4 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45486"
},
{
"category": "external",
"summary": "RHBZ#2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2112.09604.pdf",
"url": "https://arxiv.org/pdf/2112.09604.pdf"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"
}
],
"release_date": "2021-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv4 implementation"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2021-47556",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283393"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47556"
},
{
"category": "external",
"summary": "RHBZ#2283393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()"
},
{
"cve": "CVE-2021-47590",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293237"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47590"
},
{
"category": "external",
"summary": "RHBZ#2293237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()"
},
{
"cve": "CVE-2021-47614",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293265"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s RDMA/irdma driver. Improper memory management in the add_pble_prm function fails to manage memory correctly, resulting in a user-after-free condition that can lead to exploitation. This flaw allows an attacker to manipulate memory access potentially, resulting in data corruption or system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47614"
},
{
"category": "external",
"summary": "RHBZ#2293265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0001",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061712"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Branch History Injection (BHI)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0001"
},
{
"category": "external",
"summary": "RHBZ#2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Branch History Injection (BHI)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0002",
"discovery_date": "2022-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061721"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Intra-Mode BTI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0002"
},
{
"category": "external",
"summary": "RHBZ#2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Intra-Mode BTI"
},
{
"acknowledgments": [
{
"names": [
"De4dCr0w"
],
"organization": "360 Vulnerability Research Institute"
}
],
"cve": "CVE-2022-0286",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037019"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local denial of service in bond_ipsec_add_sa",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0286"
},
{
"category": "external",
"summary": "RHBZ#2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"
}
],
"release_date": "2021-07-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local denial of service in bond_ipsec_add_sa"
},
{
"cve": "CVE-2022-0322",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2021-12-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0322"
},
{
"category": "external",
"summary": "RHBZ#2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"
}
],
"release_date": "2021-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060606"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in copy_page_to_iter() in iov_iter.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0850"
},
{
"category": "external",
"summary": "RHBZ#2060606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8",
"url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"
}
],
"release_date": "2021-05-06T19:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in copy_page_to_iter() in iov_iter.c"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi",
"Jann Horn"
]
}
],
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064855"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "RHBZ#2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"
}
],
"release_date": "2022-03-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3105",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153067"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3105"
},
{
"category": "external",
"summary": "RHBZ#2153067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3106",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153066"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3106"
},
{
"category": "external",
"summary": "RHBZ#2153066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3108",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153052"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3108"
},
{
"category": "external",
"summary": "RHBZ#2153052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()"
},
{
"cve": "CVE-2023-0459",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216383"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Copy_from_user on 64-bit versions may leak kernel information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "RHBZ#2216383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c",
"url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"
}
],
"release_date": "2020-02-15T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Copy_from_user on 64-bit versions may leak kernel information"
},
{
"cve": "CVE-2023-3022",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2023-03-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2211440"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the IPv6 module of the Linux kernel. The arg.result was not used consistently in fib6_rule_lookup, sometimes holding rt6_info and other times fib6_info. This was not accounted for in other parts of the code where rt6_info was expected unconditionally, potentially leading to a kernel panic in fib6_rule_suppress.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3022"
},
{
"category": "external",
"summary": "RHBZ#2211440",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2211440"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3022"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3022"
}
],
"release_date": "2019-04-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:43:14+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1975"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"NFV-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"NFV-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.src",
"RT-8.6.0.GA:kernel-rt-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-core-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debug-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-debuginfo-common-x86_64-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-devel-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-kvm-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-0:4.18.0-372.9.1.rt7.166.el8.x86_64",
"RT-8.6.0.GA:kernel-rt-modules-extra-0:4.18.0-372.9.1.rt7.166.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: IPv6: panic in fib6_rule_suppress when fib6_rule_lookup fails"
}
]
}
RHSA-2022:1988
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for kernel is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083)\n\n* kernel: avoid cyclic entity chains due to malformed USB descriptors (CVE-2020-0404)\n\n* kernel: speculation on incompletely validated data on IBM Power9 (CVE-2020-4788)\n\n* kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c (CVE-2020-13974)\n\n* kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free (CVE-2021-0941)\n\n* kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP() (CVE-2021-3612)\n\n* kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts (CVE-2021-3669)\n\n* kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c (CVE-2021-3743)\n\n* kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() (CVE-2021-3744)\n\n* kernel: possible use-after-free in bluetooth module (CVE-2021-3752)\n\n* kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks (CVE-2021-3759)\n\n* kernel: DoS in ccp_run_aes_gcm_cmd() function (CVE-2021-3764)\n\n* kernel: sctp: Invalid chunks may be used to remotely remove existing associations (CVE-2021-3772)\n\n* kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients (CVE-2021-3773)\n\n* kernel: possible leak or coruption of data residing on hugetlbfs (CVE-2021-4002)\n\n* kernel: security regression for CVE-2018-13405 (CVE-2021-4037)\n\n* kernel: Buffer overwrite in decode_nfs_fh function (CVE-2021-4157)\n\n* kernel: cgroup: Use open-time creds and namespace for migration perm checks (CVE-2021-4197)\n\n* kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses (CVE-2021-4203)\n\n* kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies (CVE-2021-20322)\n\n* kernel: arm: SIGPAGE information disclosure vulnerability (CVE-2021-21781)\n\n* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401)\n\n* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154)\n\n* kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c (CVE-2021-37159)\n\n* kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write (CVE-2021-41864)\n\n* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739)\n\n* kernel: ppc: kvm: allows a malicious KVM guest to crash the host (CVE-2021-43056)\n\n* kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (CVE-2021-43389)\n\n* kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device (CVE-2021-43976)\n\n* kernel: use-after-free in the TEE subsystem (CVE-2021-44733)\n\n* kernel: information leak in the IPv6 implementation (CVE-2021-45485)\n\n* kernel: information leak in the IPv4 implementation (CVE-2021-45486)\n\n* hw: cpu: intel: Branch History Injection (BHI) (CVE-2022-0001)\n\n* hw: cpu: intel: Intra-Mode BTI (CVE-2022-0002)\n\n* kernel: Local denial of service in bond_ipsec_add_sa (CVE-2022-0286)\n\n* kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c (CVE-2022-0322)\n\n* kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes (CVE-2022-1011)\n\n* kernel: use-after-free in nouveau kernel module (CVE-2020-27820)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1988",
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1888433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888433"
},
{
"category": "external",
"summary": "1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "1957375",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1957375"
},
{
"category": "external",
"summary": "1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "1978123",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1978123"
},
{
"category": "external",
"summary": "1981950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981950"
},
{
"category": "external",
"summary": "1983894",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983894"
},
{
"category": "external",
"summary": "1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "1994390",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1994390"
},
{
"category": "external",
"summary": "1997338",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997338"
},
{
"category": "external",
"summary": "1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "2009312",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009312"
},
{
"category": "external",
"summary": "2009521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2009521"
},
{
"category": "external",
"summary": "2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "2011104",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2011104"
},
{
"category": "external",
"summary": "2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "2015525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015525"
},
{
"category": "external",
"summary": "2015755",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2015755"
},
{
"category": "external",
"summary": "2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "2017073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017073"
},
{
"category": "external",
"summary": "2017796",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017796"
},
{
"category": "external",
"summary": "2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "2022814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022814"
},
{
"category": "external",
"summary": "2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "2030476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030476"
},
{
"category": "external",
"summary": "2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "2031200",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2031200"
},
{
"category": "external",
"summary": "2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "2042798",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042798"
},
{
"category": "external",
"summary": "2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "2043453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2043453"
},
{
"category": "external",
"summary": "2046021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2046021"
},
{
"category": "external",
"summary": "2048251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2048251"
},
{
"category": "external",
"summary": "2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1988.json"
}
],
"title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-01T00:53:46+00:00",
"generator": {
"date": "2025-11-01T00:53:46+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2022:1988",
"initial_release_date": "2022-05-10T13:58:00+00:00",
"revision_history": [
{
"date": "2022-05-10T13:58:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:58:00+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-01T00:53:46+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "perf-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-aarch64@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64le@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "perf-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"product": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_id": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-libs-devel@4.18.0-372.9.1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"product_id": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-core@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-cross-headers@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-core@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-devel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-modules-extra@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-modules-extra@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-core@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-devel@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-modules-extra@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "perf-0:4.18.0-372.9.1.el8.s390x",
"product_id": "perf-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"product_id": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bpftool-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debug-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-tools-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-zfcpdump-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/perf-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_id": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-perf-debuginfo@4.18.0-372.9.1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:4.18.0-372.9.1.el8.src",
"product": {
"name": "kernel-0:4.18.0-372.9.1.el8.src",
"product_id": "kernel-0:4.18.0-372.9.1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@4.18.0-372.9.1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"product": {
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"product_id": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-abi-stablelists@4.18.0-372.9.1.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"product": {
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"product_id": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@4.18.0-372.9.1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.src",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.src",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:4.18.0-372.9.1.el8.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch"
},
"product_reference": "kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"relates_to_product_reference": "CRB-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
},
"product_reference": "python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"relates_to_product_reference": "CRB-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-0404",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-01-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1919791"
}
],
"notes": [
{
"category": "description",
"text": "A flaw linked list corruption in the Linux kernel for USB Video Class driver functionality was found in the way user connects web camera to the USB port. A local user could use this flaw to crash the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: avoid cyclic entity chains due to malformed USB descriptors",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-0404"
},
{
"category": "external",
"summary": "RHBZ#1919791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1919791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-0404",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0404"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-0404"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=68035c80e129c4cfec659aac4180354530b26527"
}
],
"release_date": "2021-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module uvcvideo from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: avoid cyclic entity chains due to malformed USB descriptors"
},
{
"acknowledgments": [
{
"names": [
"Anthony Steinhauser"
],
"organization": "Google\u0027s Safeside Project"
}
],
"cve": "CVE-2020-4788",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2020-10-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1888433"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. IBM Power9 processors can speculatively operate on data stored in the L1 cache before it has been completely validated. The attack has limited access to memory and is only able to access memory normally permissible to the execution context. The highest threat from this vulnerability is to data confidentiality.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: speculation on incompletely validated data on IBM Power9",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-4788"
},
{
"category": "external",
"summary": "RHBZ#1888433",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888433"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4788"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-4788",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-4788"
},
{
"category": "external",
"summary": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189296",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/189296"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc",
"url": "https://lore.kernel.org/linuxppc-dev/20201119231333.361771-1-dja@axtens.net/T/#me4f6a44748747e3327d27cd95200bf7a87486ffc"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2020/11/20/3",
"url": "https://www.openwall.com/lists/oss-security/2020/11/20/3"
}
],
"release_date": "2020-11-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: speculation on incompletely validated data on IBM Power9"
},
{
"cve": "CVE-2020-13974",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2021-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2016169"
}
],
"notes": [
{
"category": "description",
"text": "A flaw integer overflow in the Linux kernel\u0027s virtual terminal keyboard driver was found in the way the user sends some specific keyboard code multiple times. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "No code depends on this integer overflow so it is unlikely that the vulnerability can be used for anything apart from crashing the system. The impact has been reduced to Moderate from Important based on this analysis.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13974"
},
{
"category": "external",
"summary": "RHBZ#2016169",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016169"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13974",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13974"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13974"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b86dab054059b970111b5516ae548efaae5b3aae"
}
],
"release_date": "2020-03-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: integer overflow in k_ascii() in drivers/tty/vt/keyboard.c"
},
{
"acknowledgments": [
{
"names": [
"Jeremy Cline"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2020-27820",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2020-11-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1901726"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in Linux kernel, where a use-after-frees in nouveau\u0027s postclose() handler could happen if removing device (that is not common to remove video card physically without power-off, but same happens if \"unbind\" the driver).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in nouveau kernel module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Low impact because the issue can only be triggered by an privileged local user (or user with physical access) as the issue only happens during unbinding the driver or removing the device.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-27820"
},
{
"category": "external",
"summary": "RHBZ#1901726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-27820",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27820"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27820"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-2-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-3-jcline@redhat.com/"
},
{
"category": "external",
"summary": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/",
"url": "https://lore.kernel.org/dri-devel/20201103194912.184413-4-jcline@redhat.com/"
}
],
"release_date": "2020-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module nouveau from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: use-after-free in nouveau kernel module"
},
{
"cve": "CVE-2021-0941",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018205"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory access flaw was found in net/core/filter.c in __bpf_skb_max_len in the Linux kernel. A missing sanity check to the current MTU check may allow a local attacker with special user privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "RHBZ#2018205",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018205"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-0941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-0941"
},
{
"category": "external",
"summary": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0",
"url": "https://android.googlesource.com/kernel/common/+/6306c1189e77a513bf02720450bb43bd4ba5d8ae%5E%21/#F0"
}
],
"release_date": "2021-02-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bounds read in bpf_skb_change_head() of filter.c due to a use-after-free"
},
{
"acknowledgments": [
{
"names": [
"Murray McAllister"
]
}
],
"cve": "CVE-2021-3612",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-06-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1974079"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds memory write flaw was found in the Linux kernel\u2019s joystick devices subsystem, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having a Moderate impact because for the Red Hat Enterprise Linux the patch that made it possible writing memory out of bounds not applied yet, but still before that patch possible read out of bounds. Both in the default configuration of Red Hat Enterprise Linux the joysticks devices driver is disabled, so only privileged local user can enable it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3612"
},
{
"category": "external",
"summary": "RHBZ#1974079",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1974079"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3612"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3612"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/",
"url": "https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82@gmail.com/"
}
],
"release_date": "2021-06-20T12:28:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module joydev from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: joydev: zero size passed to joydev_handle_JSIOCSBTNMAP()"
},
{
"cve": "CVE-2021-3669",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1986473"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. Measuring usage of the shared memory does not scale with large shared memory segment counts which could lead to resource exhaustion and DoS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3669"
},
{
"category": "external",
"summary": "RHBZ#1986473",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986473"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3669",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3669"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3669"
}
],
"release_date": "2021-08-02T06:02:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: reading /proc/sysvipc/shm does not scale with large shared memory segment counts"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-3743",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997961"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory read flaw was found in the Qualcomm IPC router protocol in the Linux kernel. A missing sanity check allows a local attacker to gain access to out-of-bounds memory, leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "There was no shipped kernel version that was seen affected by this problem. These files are not built in our source code.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3743"
},
{
"category": "external",
"summary": "RHBZ#1997961",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997961"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3743",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3743"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3743"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=7e78c597c3eb"
},
{
"category": "external",
"summary": "https://lists.openwall.net/netdev/2021/08/17/124",
"url": "https://lists.openwall.net/netdev/2021/08/17/124"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: out-of-bound Read in qrtr_endpoint_post in net/qrtr/qrtr.c"
},
{
"cve": "CVE-2021-3744",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000627"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A memory leak in the ccp-ops crypto driver can allow attackers to cause a denial of service. This vulnerability is similar with the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3744"
},
{
"category": "external",
"summary": "RHBZ#2000627",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000627"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3744",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3744"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3744"
},
{
"category": "external",
"summary": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0",
"url": "https://kernel.googlesource.com/pub/scm/linux/kernel/git/herbert/crypto-2.6/+/505d9dcb0f7ddf9d075e729523a33d38642ae680%5E%21/#F0"
}
],
"release_date": "2021-08-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()"
},
{
"acknowledgments": [
{
"names": [
"Likang Luo"
],
"organization": "NSFOCUS Security Team"
}
],
"cve": "CVE-2021-3752",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-08-31T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999544"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible use-after-free in bluetooth module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because Only local users with privileges to access the sock_dgram Bluetooth socket can trigger this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3752"
},
{
"category": "external",
"summary": "RHBZ#1999544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3752",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3752"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3752"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20211115165435.133245729@linuxfoundation.org/"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/09/15/4",
"url": "https://www.openwall.com/lists/oss-security/2021/09/15/4"
}
],
"release_date": "2021-09-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation baser or stability. The possible solution is to disable Bluetooth completely: https://access.redhat.com/solutions/2682931",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible use-after-free in bluetooth module"
},
{
"acknowledgments": [
{
"names": [
"Yutian Yang"
],
"organization": "Zhejiang University"
}
],
"cve": "CVE-2021-3759",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2021-07-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1999675"
}
],
"notes": [
{
"category": "description",
"text": "A memory overflow vulnerability was found in the Linux kernel\u2019s ipc functionality of the memcg subsystem, in the way a user calls the semget function multiple times, creating semaphores. This flaw allows a local user to starve the resources, causing a denial of service. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3759"
},
{
"category": "external",
"summary": "RHBZ#1999675",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1999675"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3759",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3759"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3759"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/",
"url": "https://lore.kernel.org/linux-mm/1626333284-1404-1-git-send-email-nglaive@gmail.com/"
}
],
"release_date": "2021-07-15T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: unaccounted ipc objects in Linux kernel lead to breaking memcg limits and DoS attacks"
},
{
"cve": "CVE-2021-3764",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-08-23T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1997467"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in the Linux kernel\u0027s ccp_run_aes_gcm_cmd() function that allows an attacker to cause a denial of service. The vulnerability is similar to the older CVE-2019-18808. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in ccp_run_aes_gcm_cmd() function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3764"
},
{
"category": "external",
"summary": "RHBZ#1997467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1997467"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3764",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3764"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3764"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=36cf515b9bbe"
}
],
"release_date": "2021-08-20T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in ccp_run_aes_gcm_cmd() function"
},
{
"cve": "CVE-2021-3772",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"discovery_date": "2021-08-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2000694"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "RHBZ#2000694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2000694"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3772"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3772"
}
],
"release_date": "2021-09-08T06:38:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "As the SCTP module will be auto-loaded when required, its use can be disabled by preventing the module from loading with the following instructions:\nif\n# echo \"install sctp /bin/true\" \u003e\u003e /etc/modprobe.d/disable-sctp.conf\n\nThe system will need to be restarted if the SCTP modules are loaded. In most circumstances, the SCTP kernel modules will be unable to be unloaded while any network interfaces are active and the protocol is in use.\n\nIf the system requires this module to work correctly, this mitigation may not be suitable.\n\nIf you need further assistance, see KCS article https://access.redhat.com/solutions/41278 or contact Red Hat Global Support Services.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: sctp: Invalid chunks may be used to remotely remove existing associations"
},
{
"cve": "CVE-2021-3773",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2004949"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in netfilter could allow a network-connected attacker to infer openvpn connection endpoint information for further use in traditional network attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3773"
},
{
"category": "external",
"summary": "RHBZ#2004949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2004949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3773"
}
],
"release_date": "2021-09-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: lack of port sanity checking in natd and netfilter leads to exploit of OpenVPN clients"
},
{
"acknowledgments": [
{
"names": [
"elijahbai, jitxie, huntazhang."
]
}
],
"cve": "CVE-2021-3923",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2019643"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel\u0027s implementation of RDMA over infiniband. An attacker with a privileged local account can leak kernel stack information when issuing commands to the /dev/infiniband/rdma_cm device node. While this access is unlikely to leak sensitive user information, it can be further used to defeat existing kernel protection mechanisms.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: stack information leak in infiniband RDMA",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3923"
},
{
"category": "external",
"summary": "RHBZ#2019643",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2019643"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3923"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3923"
}
],
"release_date": "2021-12-01T13:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: stack information leak in infiniband RDMA"
},
{
"cve": "CVE-2021-4002",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025726"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw in the Linux kernel\u0027s hugetlbfs memory usage was found in the way the user maps some regions of memory twice using shmget() which are aligned to PUD alignment with the fault of some of the memory pages. A local user could use this flaw to get unauthorized access to some data.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: possible leak or coruption of data residing on hugetlbfs",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4002"
},
{
"category": "external",
"summary": "RHBZ#2025726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4002",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4002"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13e4ad2ce8df6e058ef482a31fdd81c725b0f7ea"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4a118f2eead1d6c49e00765de89878288d4b890"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2021/11/25/1",
"url": "https://www.openwall.com/lists/oss-security/2021/11/25/1"
}
],
"release_date": "2021-11-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: possible leak or coruption of data residing on hugetlbfs"
},
{
"cve": "CVE-2021-4037",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2021-11-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2027239"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the fs/inode.c:inode_init_owner() function logic of the LInux kernel that allows local users to create files for the XFS file-system with an unintended group ownership and with group execution and SGID permission bits set, in a scenario where a directory is SGID and belongs to a certain group and is writable by a user who is not a member of this group. This can lead to excessive permissions granted in case when they should not. This vulnerability is similar to the previous CVE-2018-13405 and adds the missed fix for the XFS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: security regression for CVE-2018-13405",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Impact is Moderate, because if no configuration problems with the system, then unlikely higher impact than unauthorized read access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4037"
},
{
"category": "external",
"summary": "RHBZ#2027239",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2027239"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4037",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4037"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4037"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=01ea173e103e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0fa3ecd87848"
}
],
"release_date": "2021-09-16T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: security regression for CVE-2018-13405"
},
{
"cve": "CVE-2021-4083",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-12-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2029923"
}
],
"notes": [
{
"category": "description",
"text": "A read-after-free memory flaw was found in the Linux kernel\u0027s garbage collection for Unix domain socket file handlers in the way users call close() and fget() simultaneously and can potentially trigger a race condition. This flaw allows a local user to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: fget: check that the fd still exists after getting a ref to it",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4083"
},
{
"category": "external",
"summary": "RHBZ#2029923",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2029923"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4083"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4083"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=054aa8d439b9"
}
],
"release_date": "2021-12-03T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "kernel: fget: check that the fd still exists after getting a ref to it"
},
{
"cve": "CVE-2021-4093",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-11-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2028584"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the KVM\u0027s AMD code for supporting the Secure Encrypted Virtualization-Encrypted State (SEV-ES). A KVM guest using SEV-ES can trigger out-of-bounds reads and writes in the host kernel via a malicious VMGEXIT for a string I/O instruction (for example, outs or ins) using the exit reason SVM_EXIT_IOIO. This issue results in a crash of the entire system or a potential guest-to-host escape scenario.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "AMD Secure Encrypted Virtualization (SEV) is currently provided as a Technology Preview in RHEL and, therefore, unsupported for production use. For additional details please see https://access.redhat.com/articles/4491591 and https://access.redhat.com/support/offerings/techpreview.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4093"
},
{
"category": "external",
"summary": "RHBZ#2028584",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2028584"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4093",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4093"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4093"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2222"
}
],
"release_date": "2021-11-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: KVM: SVM: out-of-bounds read/write in sev_es_string_io"
},
{
"cve": "CVE-2021-4157",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034342"
}
],
"notes": [
{
"category": "description",
"text": "An out of memory bounds write flaw (1 or 2 bytes of memory) in the Linux kernel NFS subsystem was found in the way users use mirroring (replication of files with NFS). A user, having access to the NFS mount, could potentially use this flaw to crash the system or escalate privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Buffer overwrite in decode_nfs_fh function",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4157"
},
{
"category": "external",
"summary": "RHBZ#2034342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034342"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4157",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4157"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4157"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20210517140244.822185482@linuxfoundation.org/"
}
],
"release_date": "2021-05-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Buffer overwrite in decode_nfs_fh function"
},
{
"cve": "CVE-2021-4197",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"discovery_date": "2021-12-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2035652"
}
],
"notes": [
{
"category": "description",
"text": "An unprivileged write to the file handler flaw in the Linux kernel\u0027s control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: cgroup: Use open-time creds and namespace for migration perm checks",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4197"
},
{
"category": "external",
"summary": "RHBZ#2035652",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2035652"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4197"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4197"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/",
"url": "https://lore.kernel.org/lkml/20211209214707.805617-1-tj@kernel.org/T/"
}
],
"release_date": "2021-09-12T09:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "The mitigation not known. However, for the default configuration of the Red Hat Enterprise Linux it is not possible to trigger this vulnerability: if control groups (cgroups) not being used or being used with the default configuration or being used some other configuration where for example similar privileges for all processes (both for parent and for child processes), then no way to trigger this vulnerability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: cgroup: Use open-time creds and namespace for migration perm checks"
},
{
"cve": "CVE-2021-4203",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2036934"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-4203"
},
{
"category": "external",
"summary": "RHBZ#2036934",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2036934"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4203"
},
{
"category": "external",
"summary": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1",
"url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=2230\u0026can=7\u0026q=modified-after%3Atoday-30\u0026sort=-modified\u0026colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve\u0026cells=tiles\u0026redir=1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/",
"url": "https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet@gmail.com/T/"
}
],
"release_date": "2021-09-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Race condition in races in sk_peer_pid and sk_peer_cred accesses"
},
{
"acknowledgments": [
{
"names": [
"Keyu Man, Xin\u0027an Zhou and Zhiyun Qian"
],
"organization": "University of California, Riverside"
}
],
"cve": "CVE-2021-20322",
"cwe": {
"id": "CWE-330",
"name": "Use of Insufficiently Random Values"
},
"discovery_date": "2021-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2014230"
}
],
"notes": [
{
"category": "description",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is rated as having Moderate impact because of the attack scenario limitation. It is possible to harm the networking services only, but not for the overall system under attack, and impossible to get access to this remote system under attack.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "RHBZ#2014230",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2014230"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20322",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=4785305c05b25a242e5314cc821f54ade4c18810"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6\u0026id=6457378fe796815c973f631a1904e147d6ee33b1"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6\u0026id=67d6d681e15b578c1725bad8ad079e05d1c48a8e"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6\u0026id=a00df2caffed3883c341d5685f830434312e4a43"
}
],
"release_date": "2021-08-26T08:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: new DNS Cache Poisoning Attack based on ICMP fragment needed packets replies"
},
{
"cve": "CVE-2021-21781",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-07-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1981950"
}
],
"notes": [
{
"category": "description",
"text": "An information disclosure flaw exists in the ARM SIGPAGE functionality of the Linux kernel. An attacker with a local account can read the contents of the sigpage, which contains previously initialized kernel memory contents. This flaw requires an attacker to read a process\u2019s memory at a specific offset to trigger this vulnerability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: arm: SIGPAGE information disclosure vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-21781"
},
{
"category": "external",
"summary": "RHBZ#1981950",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1981950"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21781"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21781",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21781"
},
{
"category": "external",
"summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2021-1243"
}
],
"release_date": "2021-06-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: arm: SIGPAGE information disclosure vulnerability"
},
{
"acknowledgments": [
{
"names": [
"AMD"
]
}
],
"cve": "CVE-2021-26401",
"discovery_date": "2022-03-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061700"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The speculative execution window of AMD LFENCE/JMP mitigation (MITIGATION V2-2) may be large enough to be exploited on AMD CPUs.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-26401"
},
{
"category": "external",
"summary": "RHBZ#2061700",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061700"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-26401",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26401"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-26401"
},
{
"category": "external",
"summary": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036",
"url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "AMD recommends mitigation that uses generic retpoline.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715"
},
{
"cve": "CVE-2021-29154",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1946684"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernels eBPF implementation. By default, accessing the eBPF verifier is only accessible to privileged users with CAP_SYS_ADMIN. A local user with the ability to insert eBPF instructions can abuse a flaw in eBPF to corrupt memory. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw is rated as having Moderate impact as eBPF requires a privileged user on Red Hat Enterprise Linux to correctly load eBPF instructions that can be exploited.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-29154"
},
{
"category": "external",
"summary": "RHBZ#1946684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1946684"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-29154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29154"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-29154"
}
],
"release_date": "2021-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "This issue does not affect most systems by default. An administrator would need to have enabled the BPF JIT to be affected.\n\nIt can be disabled immediately with the command:\n\n# echo 0 \u003e /proc/sys/net/core/bpf_jit_enable\n\nOr it can be disabled for all subsequent boots of the system by setting a value in /etc/sysctl.d/44-bpf-jit-disable\n\n## start file ##\n\nnet.core.bpf_jit_enable=0\n\n## end file ##",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation"
},
{
"cve": "CVE-2021-37159",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-07-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1985353"
}
],
"notes": [
{
"category": "description",
"text": "A flaw use-after-free in the Linux kernel USB High Speed Mobile Devices functionality was found in the way user detaches USB device. A local user could use this flaw to crash the system or escalate their privileges on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "RHBZ#1985353",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985353"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-37159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-37159"
},
{
"category": "external",
"summary": "https://www.spinics.net/lists/linux-usb/msg202228.html",
"url": "https://www.spinics.net/lists/linux-usb/msg202228.html"
}
],
"release_date": "2020-10-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module hso from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in hso_free_net_device() in drivers/net/usb/hso.c"
},
{
"cve": "CVE-2021-40490",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2021-09-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2001951"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Linux kernel. A race condition was discovered in the ext4 subsystem. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is actual only if inline_data enabled for the ext4 partition, and by default it is disabled.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-40490"
},
{
"category": "external",
"summary": "RHBZ#2001951",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2001951"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-40490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40490"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-40490",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-40490"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/tytso/ext4.git/commit/?id=9e445093e523f3277081314c864f708fd4bd34aa"
}
],
"release_date": "2021-09-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: race condition was discovered in ext4_write_inline_data_end in fs/ext4/inline.c in the ext4 subsystem"
},
{
"cve": "CVE-2021-41864",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2010463"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds (OOB) memory write flaw was found in prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the bpf in the Linux kernel. In this flaw, the multiplication to calculate the size could lead to an integer overflow which could allow a local attacker, with a special user privilege, to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl. This would require a privileged user with CAP_SYS_ADMIN or root to be able to abuse this flaw reducing its attack space.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n~~~\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n~~~\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nA kernel update will be required to mitigate the flaw for the root or users with CAP_SYS_ADMIN capabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "RHBZ#2010463",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2010463"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-41864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41864"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-41864"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a",
"url": "https://github.com/torvalds/linux/commit/30e29a9a2bc6a4888335a6ede968b75cd329657a"
}
],
"release_date": "2021-09-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: eBPF multiplication integer overflow in prealloc_elems_and_freelist() in kernel/bpf/stackmap.c leads to out-of-bounds write"
},
{
"cve": "CVE-2021-42739",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2021-04-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1951739"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in the Linux kernel FireDTV media card driver, where the user calls the CA_SEND_MSG ioctl. This flaw allows a local user of the host machine to crash the system or escalate privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Heap buffer overflow in firedtv driver",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "RHBZ#1951739",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1951739"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-42739",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42739"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/",
"url": "https://lore.kernel.org/linux-media/YHaulytonFcW+lyZ@mwanda/"
}
],
"release_date": "2021-04-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module firedtv from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Heap buffer overflow in firedtv driver"
},
{
"cve": "CVE-2021-43056",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"discovery_date": "2021-10-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017073"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service problem was found in the Linux kernel\u0027s Kernel-based Virtual Machine (KVM) specific to PowerPC. In this flaw, a user with local access can confuse the host offline code, causing the guest to crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ppc: kvm: allows a malicious KVM guest to crash the host",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43056"
},
{
"category": "external",
"summary": "RHBZ#2017073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43056",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43056"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43056",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43056"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cdeb5d7d890e14f3b70e8087e745c4a6a7d9f337"
}
],
"release_date": "2021-10-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ppc: kvm: allows a malicious KVM guest to crash the host"
},
{
"acknowledgments": [
{
"names": [
"Active Defense Lab"
],
"organization": "Venustech"
}
],
"cve": "CVE-2021-43389",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-10-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2013180"
}
],
"notes": [
{
"category": "description",
"text": "An improper validation of an array index and out of bounds memory read in the Linux kernel\u0027s Integrated Services Digital Network (ISDN) functionality was found in the way users call ioctl CMTPCONNADD. A local user could use this flaw to crash the system or starve the resources causing denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "RHBZ#2013180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43389"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"category": "external",
"summary": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
}
],
"release_date": "2021-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module isdn from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: an array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c"
},
{
"cve": "CVE-2021-43976",
"cwe": {
"id": "CWE-459",
"name": "Incomplete Cleanup"
},
"discovery_date": "2021-11-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2025003"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service flaw was found in mwifiex_usb_recv in drivers/net/wireless/marvell/mwifiex/usb.c in the usb subsystem of the Linux kernel. This is due to a missing clean-up for a malfunctioning usb device with an unknown recv_type.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43976"
},
{
"category": "external",
"summary": "RHBZ#2025003",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2025003"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43976"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43976"
},
{
"category": "external",
"summary": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/",
"url": "https://patchwork.kernel.org/project/linux-wireless/patch/YX4CqjfRcTa6bVL+@Zekuns-MBP-16.fios-router.home/"
}
],
"release_date": "2021-10-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mwifiex_usb_recv() in drivers/net/wireless/marvell/mwifiex/usb.c allows an attacker to cause DoS via crafted USB device"
},
{
"acknowledgments": [
{
"names": [
"Patrik Lantz"
],
"organization": "axis.com"
}
],
"cve": "CVE-2021-44733",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"discovery_date": "2021-12-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2030747"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw in the Linux kernel TEE (Trusted Execution Environment) subsystem was found in the way user calls ioctl TEE_IOC_OPEN_SESSION or TEE_IOC_INVOKE. A local user could use this flaw to crash the system or escalate their privileges on the system. If the Linux system non configured with the CONFIG_PREEMPT option or CONFIG_CPU_SW_DOMAIN_PAN option enabled, then it is unlikely that a user can trigger this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: use-after-free in the TEE subsystem",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44733"
},
{
"category": "external",
"summary": "RHBZ#2030747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2030747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44733"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44733"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/",
"url": "https://lore.kernel.org/lkml/20211214123540.1789434-1-jens.wiklander@linaro.org/"
}
],
"release_date": "2021-12-14T12:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the modules tee, trusted_tee from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: use-after-free in the TEE subsystem"
},
{
"cve": "CVE-2021-45485",
"cwe": {
"id": "CWE-327",
"name": "Use of a Broken or Risky Cryptographic Algorithm"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039911"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv6 implementation in the __ipv6_select_ident in net/ipv6/output_core.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv6 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45485"
},
{
"category": "external",
"summary": "RHBZ#2039911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039911"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45485"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45485"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=62f20e068ccc50d6ab66fdb72ba90da2b9418c99"
},
{
"category": "external",
"summary": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/",
"url": "https://lore.kernel.org/all/20210529110746.6796-1-w@1wt.eu/"
}
],
"release_date": "2021-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv6 implementation"
},
{
"cve": "CVE-2021-45486",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2039914"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in the Linux kernel\u2019s IPv4 implementation in the ip_rt_init in net/ipv4/route.c function. The use of a small hash table in IP ID generation allows a remote attacker to reveal sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in the IPv4 implementation",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45486"
},
{
"category": "external",
"summary": "RHBZ#2039914",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2039914"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45486",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45486"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2112.09604.pdf",
"url": "https://arxiv.org/pdf/2112.09604.pdf"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/ipv4/route.c?id=aa6dd211e4b1dde9d5dc25d699d35f789ae7eeba"
}
],
"release_date": "2021-03-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in the IPv4 implementation"
},
{
"cve": "CVE-2021-47076",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-03-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2267525"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/rxe: Return CQE error if invalid lkey was supplied\n\nRXE is missing update of WQE status in LOCAL_WRITE failures. This caused\nthe following kernel panic if someone sent an atomic operation with an\nexplicitly wrong lkey.\n\n[leonro@vm ~]$ mkt test\ntest_atomic_invalid_lkey (tests.test_atomic.AtomicTest) ...\n WARNING: CPU: 5 PID: 263 at drivers/infiniband/sw/rxe/rxe_comp.c:740 rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Modules linked in: crc32_generic rdma_rxe ip6_udp_tunnel udp_tunnel rdma_ucm rdma_cm ib_umad ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core ptp pps_core\n CPU: 5 PID: 263 Comm: python3 Not tainted 5.13.0-rc1+ #2936\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:rxe_completer+0x1a6d/0x2e30 [rdma_rxe]\n Code: 03 0f 8e 65 0e 00 00 3b 93 10 06 00 00 0f 84 82 0a 00 00 4c 89 ff 4c 89 44 24 38 e8 2d 74 a9 e1 4c 8b 44 24 38 e9 1c f5 ff ff \u003c0f\u003e 0b e9 0c e8 ff ff b8 05 00 00 00 41 bf 05 00 00 00 e9 ab e7 ff\n RSP: 0018:ffff8880158af090 EFLAGS: 00010246\n RAX: 0000000000000000 RBX: ffff888016a78000 RCX: ffffffffa0cf1652\n RDX: 1ffff9200004b442 RSI: 0000000000000004 RDI: ffffc9000025a210\n RBP: dffffc0000000000 R08: 00000000ffffffea R09: ffff88801617740b\n R10: ffffed1002c2ee81 R11: 0000000000000007 R12: ffff88800f3b63e8\n R13: ffff888016a78008 R14: ffffc9000025a180 R15: 000000000000000c\n FS: 00007f88b622a740(0000) GS:ffff88806d540000(0000) knlGS:0000000000000000\n CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007f88b5a1fa10 CR3: 000000000d848004 CR4: 0000000000370ea0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0xb11/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_responder+0x5532/0x7620 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_rcv+0x9c8/0x1df0 [rdma_rxe]\n rxe_loopback+0x157/0x1e0 [rdma_rxe]\n rxe_requester+0x1efd/0x58c0 [rdma_rxe]\n rxe_do_task+0x130/0x230 [rdma_rxe]\n rxe_post_send+0x998/0x1860 [rdma_rxe]\n ib_uverbs_post_send+0xd5f/0x1220 [ib_uverbs]\n ib_uverbs_write+0x847/0xc80 [ib_uverbs]\n vfs_write+0x1c5/0x840\n ksys_write+0x176/0x1d0\n do_syscall_64+0x3f/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47076"
},
{
"category": "external",
"summary": "RHBZ#2267525",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267525"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47076"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47076"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u",
"url": "https://lore.kernel.org/linux-cve-announce/2024030142-CVE-2021-47076-a6b6@gregkh/T/#u"
}
],
"release_date": "2024-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/rxe: Return CQE error if invalid lkey was supplied"
},
{
"cve": "CVE-2021-47178",
"cwe": {
"id": "CWE-99",
"name": "Improper Control of Resource Identifiers (\u0027Resource Injection\u0027)"
},
"discovery_date": "2024-03-25T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2271461"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: core: Avoid smp_processor_id() in preemptible code\n\nThe BUG message \"BUG: using smp_processor_id() in preemptible [00000000]\ncode\" was observed for TCMU devices with kernel config DEBUG_PREEMPT.\n\nThe message was observed when blktests block/005 was run on TCMU devices\nwith fileio backend or user:zbc backend [1]. The commit 1130b499b4a7\n(\"scsi: target: tcm_loop: Use LIO wq cmd submission helper\") triggered the\nsymptom. The commit modified work queue to handle commands and changed\n\u0027current-\u003enr_cpu_allowed\u0027 at smp_processor_id() call.\n\nThe message was also observed at system shutdown when TCMU devices were not\ncleaned up [2]. The function smp_processor_id() was called in SCSI host\nwork queue for abort handling, and triggered the BUG message. This symptom\nwas observed regardless of the commit 1130b499b4a7 (\"scsi: target:\ntcm_loop: Use LIO wq cmd submission helper\").\n\nTo avoid the preemptible code check at smp_processor_id(), get CPU ID with\nraw_smp_processor_id() instead. The CPU ID is used for performance\nimprovement then thread move to other CPU will not affect the code.\n\n[1]\n\n[ 56.468103] run blktests block/005 at 2021-05-12 14:16:38\n[ 57.369473] check_preemption_disabled: 85 callbacks suppressed\n[ 57.369480] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1511\n[ 57.369506] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1510\n[ 57.369512] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1506\n[ 57.369552] caller is __target_init_cmd+0x157/0x170 [target_core_mod]\n[ 57.369606] CPU: 4 PID: 1506 Comm: fio Not tainted 5.13.0-rc1+ #34\n[ 57.369613] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018\n[ 57.369617] Call Trace:\n[ 57.369621] BUG: using smp_processor_id() in preemptible [00000000] code: fio/1507\n[ 57.369628] dump_stack+0x6d/0x89\n[ 57.369642] check_preemption_disabled+0xc8/0xd0\n[ 57.369628] caller is __target_init_cmd+0x157/0x170 [target_core_mod]\n[ 57.369655] __target_init_cmd+0x157/0x170 [target_core_mod]\n[ 57.369695] target_init_cmd+0x76/0x90 [target_core_mod]\n[ 57.369732] tcm_loop_queuecommand+0x109/0x210 [tcm_loop]\n[ 57.369744] scsi_queue_rq+0x38e/0xc40\n[ 57.369761] __blk_mq_try_issue_directly+0x109/0x1c0\n[ 57.369779] blk_mq_try_issue_directly+0x43/0x90\n[ 57.369790] blk_mq_submit_bio+0x4e5/0x5d0\n[ 57.369812] submit_bio_noacct+0x46e/0x4e0\n[ 57.369830] __blkdev_direct_IO_simple+0x1a3/0x2d0\n[ 57.369859] ? set_init_blocksize.isra.0+0x60/0x60\n[ 57.369880] generic_file_read_iter+0x89/0x160\n[ 57.369898] blkdev_read_iter+0x44/0x60\n[ 57.369906] new_sync_read+0x102/0x170\n[ 57.369929] vfs_read+0xd4/0x160\n[ 57.369941] __x64_sys_pread64+0x6e/0xa0\n[ 57.369946] ? lockdep_hardirqs_on+0x79/0x100\n[ 57.369958] do_syscall_64+0x3a/0x70\n[ 57.369965] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 57.369973] RIP: 0033:0x7f7ed4c1399f\n[ 57.369979] Code: 08 89 3c 24 48 89 4c 24 18 e8 7d f3 ff ff 4c 8b 54 24 18 48 8b 54 24 10 41 89 c0 48 8b 74 24 08 8b 3c 24 b8 11 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 31 44 89 c7 48 89 04 24 e8 cd f3 ff ff 48 8b\n[ 57.369983] RSP: 002b:00007ffd7918c580 EFLAGS: 00000293 ORIG_RAX: 0000000000000011\n[ 57.369990] RAX: ffffffffffffffda RBX: 00000000015b4540 RCX: 00007f7ed4c1399f\n[ 57.369993] RDX: 0000000000001000 RSI: 00000000015de000 RDI: 0000000000000009\n[ 57.369996] RBP: 00000000015b4540 R08: 0000000000000000 R09: 0000000000000001\n[ 57.369999] R10: 0000000000e5c000 R11: 0000000000000293 R12: 00007f7eb5269a70\n[ 57.370002] R13: 0000000000000000 R14: 0000000000001000 R15: 00000000015b4568\n[ 57.370031] CPU: 7 PID: 1507 Comm: fio Not tainted 5.13.0-rc1+ #34\n[ 57.370036] Hardware name: System manufacturer System Product Name/PRIME Z270-A, BIOS 1302 03/15/2018\n[ 57.370039] Call Trace:\n[ 57.370045] dump_stack+0x6d/0x89\n[ 57.370056] ch\n---truncated---",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: target: core: Avoid smp_processor_id() in preemptible code",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47178"
},
{
"category": "external",
"summary": "RHBZ#2271461",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271461"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47178"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47178",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47178"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024032538-CVE-2021-47178-6167@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024032538-CVE-2021-47178-6167@gregkh/T"
}
],
"release_date": "2024-03-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: scsi: target: core: Avoid smp_processor_id() in preemptible code"
},
{
"cve": "CVE-2021-47203",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-04-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2274634"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel while parsing the txq list in the lpfc_drain_txq() function. Due to improper handling of a local fail message string which is set when a job fails and is never unset for subsequent jobs, this issue can lead to list corruption as jobs may be added to both the txq and the completions list. This could result in system instability or inconsistencies.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.6 and above (including 8.10):\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()\n\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47203"
},
{
"category": "external",
"summary": "RHBZ#2274634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2274634"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47203"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47203-ff72@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024041037-CVE-2021-47203-ff72@gregkh/T"
}
],
"release_date": "2024-04-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()"
},
{
"cve": "CVE-2021-47301",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-05-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282482"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s igb driver. During a reset operation, the driver could access memory that had already been freed. If the driver attempts to use this freed memory, it can lead to a system crash or instability because the memory may no longer be valid.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: igb: Fix use-after-free error during reset",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as a Moderate severity because the issue primarily impacts system stability by potentially causing a crash if the driver interacts with freed memory. It does not expose sensitive information or allow unauthorized access.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47301"
},
{
"category": "external",
"summary": "RHBZ#2282482",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282482"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47301"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47301",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47301"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052126-CVE-2021-47301-13b4@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052126-CVE-2021-47301-13b4@gregkh/T"
}
],
"release_date": "2024-05-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: igb: Fix use-after-free error during reset"
},
{
"cve": "CVE-2021-47435",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282879"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm: fix mempool NULL pointer race when completing IO\n\ndm_io_dec_pending() calls end_io_acct() first and will then dec md\nin-flight pending count. But if a task is swapping DM table at same\ntime this can result in a crash due to mempool-\u003eelements being NULL:\n\ntask1 task2\ndo_resume\n -\u003edo_suspend\n -\u003edm_wait_for_completion\n bio_endio\n\t\t\t\t -\u003eclone_endio\n\t\t\t\t -\u003edm_io_dec_pending\n\t\t\t\t -\u003eend_io_acct\n\t\t\t\t -\u003ewakeup task1\n -\u003edm_swap_table\n -\u003e__bind\n -\u003e__bind_mempools\n -\u003ebioset_exit\n -\u003emempool_exit\n -\u003efree_io\n\n[ 67.330330] Unable to handle kernel NULL pointer dereference at\nvirtual address 0000000000000000\n......\n[ 67.330494] pstate: 80400085 (Nzcv daIf +PAN -UAO)\n[ 67.330510] pc : mempool_free+0x70/0xa0\n[ 67.330515] lr : mempool_free+0x4c/0xa0\n[ 67.330520] sp : ffffff8008013b20\n[ 67.330524] x29: ffffff8008013b20 x28: 0000000000000004\n[ 67.330530] x27: ffffffa8c2ff40a0 x26: 00000000ffff1cc8\n[ 67.330535] x25: 0000000000000000 x24: ffffffdada34c800\n[ 67.330541] x23: 0000000000000000 x22: ffffffdada34c800\n[ 67.330547] x21: 00000000ffff1cc8 x20: ffffffd9a1304d80\n[ 67.330552] x19: ffffffdada34c970 x18: 000000b312625d9c\n[ 67.330558] x17: 00000000002dcfbf x16: 00000000000006dd\n[ 67.330563] x15: 000000000093b41e x14: 0000000000000010\n[ 67.330569] x13: 0000000000007f7a x12: 0000000034155555\n[ 67.330574] x11: 0000000000000001 x10: 0000000000000001\n[ 67.330579] x9 : 0000000000000000 x8 : 0000000000000000\n[ 67.330585] x7 : 0000000000000000 x6 : ffffff80148b5c1a\n[ 67.330590] x5 : ffffff8008013ae0 x4 : 0000000000000001\n[ 67.330596] x3 : ffffff80080139c8 x2 : ffffff801083bab8\n[ 67.330601] x1 : 0000000000000000 x0 : ffffffdada34c970\n[ 67.330609] Call trace:\n[ 67.330616] mempool_free+0x70/0xa0\n[ 67.330627] bio_put+0xf8/0x110\n[ 67.330638] dec_pending+0x13c/0x230\n[ 67.330644] clone_endio+0x90/0x180\n[ 67.330649] bio_endio+0x198/0x1b8\n[ 67.330655] dec_pending+0x190/0x230\n[ 67.330660] clone_endio+0x90/0x180\n[ 67.330665] bio_endio+0x198/0x1b8\n[ 67.330673] blk_update_request+0x214/0x428\n[ 67.330683] scsi_end_request+0x2c/0x300\n[ 67.330688] scsi_io_completion+0xa0/0x710\n[ 67.330695] scsi_finish_command+0xd8/0x110\n[ 67.330700] scsi_softirq_done+0x114/0x148\n[ 67.330708] blk_done_softirq+0x74/0xd0\n[ 67.330716] __do_softirq+0x18c/0x374\n[ 67.330724] irq_exit+0xb4/0xb8\n[ 67.330732] __handle_domain_irq+0x84/0xc0\n[ 67.330737] gic_handle_irq+0x148/0x1b0\n[ 67.330744] el1_irq+0xe8/0x190\n[ 67.330753] lpm_cpuidle_enter+0x4f8/0x538\n[ 67.330759] cpuidle_enter_state+0x1fc/0x398\n[ 67.330764] cpuidle_enter+0x18/0x20\n[ 67.330772] do_idle+0x1b4/0x290\n[ 67.330778] cpu_startup_entry+0x20/0x28\n[ 67.330786] secondary_start_kernel+0x160/0x170\n\nFix this by:\n1) Establishing pointers to \u0027struct dm_io\u0027 members in\ndm_io_dec_pending() so that they may be passed into end_io_acct()\n_after_ free_io() is called.\n2) Moving end_io_acct() after free_io().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm: fix mempool NULL pointer race when completing IO",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47435"
},
{
"category": "external",
"summary": "RHBZ#2282879",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282879"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47435",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47435"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47435"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm: fix mempool NULL pointer race when completing IO"
},
{
"cve": "CVE-2021-47498",
"cwe": {
"id": "CWE-399",
"name": "CWE-399"
},
"discovery_date": "2024-05-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2282917"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm rq: don\u0027t queue request to blk-mq during DM suspend\n\nDM uses blk-mq\u0027s quiesce/unquiesce to stop/start device mapper queue.\n\nBut blk-mq\u0027s unquiesce may come from outside events, such as elevator\nswitch, updating nr_requests or others, and request may come during\nsuspend, so simply ask for blk-mq to requeue it.\n\nFixes one kernel panic issue when running updating nr_requests and\ndm-mpath suspend/resume stress test.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: dm rq: don\u0027t queue request to blk-mq during DM suspend",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.6 and above (including 8.10):\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) dm rq: don\u0027t queue request to blk-mq during DM suspend\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47498"
},
{
"category": "external",
"summary": "RHBZ#2282917",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282917"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47498",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47498"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47498",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47498"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052243-CVE-2021-47498-dc02@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052243-CVE-2021-47498-dc02@gregkh/T"
}
],
"release_date": "2024-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: dm rq: don\u0027t queue request to blk-mq during DM suspend"
},
{
"cve": "CVE-2021-47501",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283453"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni40e: Fix NULL pointer dereference in i40e_dbg_dump_desc\n\nWhen trying to dump VFs VSI RX/TX descriptors\nusing debugfs there was a crash\ndue to NULL pointer dereference in i40e_dbg_dump_desc.\nAdded a check to i40e_dbg_dump_desc that checks if\nVSI type is correct for dumping RX/TX descriptors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47501"
},
{
"category": "external",
"summary": "RHBZ#2283453",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283453"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47501"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47501",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47501"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc"
},
{
"cve": "CVE-2021-47544",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283406"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix page frag corruption on page fault\n\nSteffen reported a TCP stream corruption for HTTP requests\nserved by the apache web-server using a cifs mount-point\nand memory mapping the relevant file.\n\nThe root cause is quite similar to the one addressed by\ncommit 20eb4f29b602 (\"net: fix sk_page_frag() recursion from\nmemory reclaim\"). Here the nested access to the task page frag\nis caused by a page fault on the (mmapped) user-space memory\nbuffer coming from the cifs file.\n\nThe page fault handler performs an smb transaction on a different\nsocket, inside the same process context. Since sk-\u003esk_allaction\nfor such socket does not prevent the usage for the task_frag,\nthe nested allocation modify \"under the hood\" the page frag\nin use by the outer sendmsg call, corrupting the stream.\n\nThe overall relevant stack trace looks like the following:\n\nhttpd 78268 [001] 3461630.850950: probe:tcp_sendmsg_locked:\n ffffffff91461d91 tcp_sendmsg_locked+0x1\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139814e sock_sendmsg+0x3e\n ffffffffc06dfe1d smb_send_kvec+0x28\n [...]\n ffffffffc06cfaf8 cifs_readpages+0x213\n ffffffff90e83c4b read_pages+0x6b\n ffffffff90e83f31 __do_page_cache_readahead+0x1c1\n ffffffff90e79e98 filemap_fault+0x788\n ffffffff90eb0458 __do_fault+0x38\n ffffffff90eb5280 do_fault+0x1a0\n ffffffff90eb7c84 __handle_mm_fault+0x4d4\n ffffffff90eb8093 handle_mm_fault+0xc3\n ffffffff90c74f6d __do_page_fault+0x1ed\n ffffffff90c75277 do_page_fault+0x37\n ffffffff9160111e page_fault+0x1e\n ffffffff9109e7b5 copyin+0x25\n ffffffff9109eb40 _copy_from_iter_full+0xe0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462370 tcp_sendmsg_locked+0x5e0\n ffffffff91462b57 tcp_sendmsg+0x27\n ffffffff9139815c sock_sendmsg+0x4c\n ffffffff913981f7 sock_write_iter+0x97\n ffffffff90f2cc56 do_iter_readv_writev+0x156\n ffffffff90f2dff0 do_iter_write+0x80\n ffffffff90f2e1c3 vfs_writev+0xa3\n ffffffff90f2e27c do_writev+0x5c\n ffffffff90c042bb do_syscall_64+0x5b\n ffffffff916000ad entry_SYSCALL_64_after_hwframe+0x65\n\nThe cifs filesystem rightfully sets sk_allocations to GFP_NOFS,\nwe can avoid the nesting using the sk page frag for allocation\nlacking the __GFP_FS flag. Do not define an additional mm-helper\nfor that, as this is strictly tied to the sk page frag usage.\n\nv1 -\u003e v2:\n - use a stricted sk_page_frag() check instead of reordering the\n code (Eric)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: tcp: fix page frag corruption on page fault",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47544"
},
{
"category": "external",
"summary": "RHBZ#2283406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47544"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47544"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052440-CVE-2021-47544-ceb5@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: tcp: fix page frag corruption on page fault"
},
{
"cve": "CVE-2021-47556",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2024-05-24T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2283393"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()\n\nethtool_set_coalesce() now uses both the .get_coalesce() and\n.set_coalesce() callbacks. But the check for their availability is\nbuggy, so changing the coalesce settings on a device where the driver\nprovides only _one_ of the callbacks results in a NULL pointer\ndereference instead of an -EOPNOTSUPP.\n\nFix the condition so that the availability of both callbacks is\nensured. This also matches the netlink code.\n\nNote that reproducing this requires some effort - it only affects the\nlegacy ioctl path, and needs a specific combination of driver options:\n- have .get_coalesce() and .coalesce_supported but no\n .set_coalesce(), or\n- have .set_coalesce() but no .get_coalesce(). Here eg. ethtool doesn\u0027t\n cause the crash as it first attempts to call ethtool_get_coalesce()\n and bails out on error.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47556"
},
{
"category": "external",
"summary": "RHBZ#2283393",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2283393"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47556"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47556"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024052443-CVE-2021-47556-558e@gregkh/T"
}
],
"release_date": "2024-05-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: ethtool: ioctl: fix potential NULL deref in ethtool_set_coalesce()"
},
{
"cve": "CVE-2021-47590",
"cwe": {
"id": "CWE-833",
"name": "Deadlock"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293237"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: fix deadlock in __mptcp_push_pending()\n\n__mptcp_push_pending() may call mptcp_flush_join_list() with subflow\nsocket lock held. If such call hits mptcp_sockopt_sync_all() then\nsubsequently __mptcp_sockopt_sync() could try to lock the subflow\nsocket for itself, causing a deadlock.\n\nsysrq: Show Blocked State\ntask:ss-server state:D stack: 0 pid: 938 ppid: 1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x2d6/0x10c0\n ? __mod_memcg_state+0x4d/0x70\n ? csum_partial+0xd/0x20\n ? _raw_spin_lock_irqsave+0x26/0x50\n schedule+0x4e/0xc0\n __lock_sock+0x69/0x90\n ? do_wait_intr_irq+0xa0/0xa0\n __lock_sock_fast+0x35/0x50\n mptcp_sockopt_sync_all+0x38/0xc0\n __mptcp_push_pending+0x105/0x200\n mptcp_sendmsg+0x466/0x490\n sock_sendmsg+0x57/0x60\n __sys_sendto+0xf0/0x160\n ? do_wait_intr_irq+0xa0/0xa0\n ? fpregs_restore_userregs+0x12/0xd0\n __x64_sys_sendto+0x20/0x30\n do_syscall_64+0x38/0x90\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7f9ba546c2d0\nRSP: 002b:00007ffdc3b762d8 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f9ba56c8060 RCX: 00007f9ba546c2d0\nRDX: 000000000000077a RSI: 0000000000e5e180 RDI: 0000000000000234\nRBP: 0000000000cc57f0 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007f9ba56c8060\nR13: 0000000000b6ba60 R14: 0000000000cc7840 R15: 41d8685b1d7901b8\n \u003c/TASK\u003e\n\nFix the issue by using __mptcp_flush_join_list() instead of plain\nmptcp_flush_join_list() inside __mptcp_push_pending(), as suggested by\nFlorian. The sockopt sync will be deferred to the workqueue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: mptcp: fix deadlock in __mptcp_push_pending()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47590"
},
{
"category": "external",
"summary": "RHBZ#2293237",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293237"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47590",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47590"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061919-CVE-2021-47590-6db0@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: mptcp: fix deadlock in __mptcp_push_pending()"
},
{
"cve": "CVE-2021-47614",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293265"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Linux kernel\u0027s RDMA/irdma driver. Improper memory management in the add_pble_prm function fails to manage memory correctly, resulting in a user-after-free condition that can lead to exploitation. This flaw allows an attacker to manipulate memory access potentially, resulting in data corruption or system crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-47614"
},
{
"category": "external",
"summary": "RHBZ#2293265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-47614",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47614"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-47614"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024061908-CVE-2021-47614-6dd2@gregkh/T"
}
],
"release_date": "2024-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/irdma: Fix a user-after-free in add_pble_prm"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0001",
"discovery_date": "2022-03-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061712"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Branch History Injection (BHI) describes a specific form of intra-mode BTI. This flaw allows an unprivileged attacker to manipulate the branch history before transitioning to supervisor or VMX root mode. This issue is an effort to cause an indirect branch predictor to select a specific predictor entry for an indirect branch, and a disclosure gadget at the predicted target will transiently execute. This execution is possible since the relevant branch history may contain branches taken in previous security contexts, and in particular, in other predictor modes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Branch History Injection (BHI)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0001"
},
{
"category": "external",
"summary": "RHBZ#2061712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061712"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0001"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0001"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7, the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Branch History Injection (BHI)"
},
{
"acknowledgments": [
{
"names": [
"Intel"
]
}
],
"cve": "CVE-2022-0002",
"discovery_date": "2022-03-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2061721"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in hw. The Intra-mode BTI refers to a variant of Branch Target Injection aka SpectreV2 (BTI) where an indirect branch speculates to an aliased predictor entry for a different indirect branch in the same predictor mode, and a disclosure gadget at the predicted target transiently executes. These predictor entries may contain targets corresponding to the targets of an indirect near jump, indirect near call, and near return instructions, even if these branches were only transiently executed. The managed runtimes provide an attacker with the means to create the aliasing required for intra-mode BTI attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hw: cpu: intel: Intra-Mode BTI",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The current known mechanisms to exploit this issue rely on unprivileged eBPF functionality. Unprivileged eBPF is disabled by default on Red Hat Enterprise Linux.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0002"
},
{
"category": "external",
"summary": "RHBZ#2061721",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061721"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0002"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0002"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html",
"url": "https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html"
},
{
"category": "external",
"summary": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html"
},
{
"category": "external",
"summary": "https://www.vusec.net/projects/bhi-spectre-bhb/",
"url": "https://www.vusec.net/projects/bhi-spectre-bhb/"
}
],
"release_date": "2022-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Disabling unprivileged eBPF effectively mitigates the known attack vectors for exploiting intra-mode branch injections attacks.\n\nThe default Red Hat Enterprise Linux kernel prevents unprivileged users from being able to use eBPF by the kernel.unprivileged_bpf_disabled sysctl.\n\nFor the Red Hat Enterprise Linux 7 the eBPF for unprivileged users is always disabled.\n\nFor the Red Hat Enterprise Linux 8 to confirm the current state, inspect the sysctl with the command:\n\n# cat /proc/sys/kernel/unprivileged_bpf_disabled\n\nThe setting of 1 would mean that unprivileged users can not use eBPF, mitigating the flaw.\n\nContinue to enable SMEP and Enhanced IBRS. This is the default setting on eligible CPUs.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "hw: cpu: intel: Intra-Mode BTI"
},
{
"acknowledgments": [
{
"names": [
"De4dCr0w"
],
"organization": "360 Vulnerability Research Institute"
}
],
"cve": "CVE-2022-0286",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-01-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2037019"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in the Linux kernel\u2019s bonding driver in the way a user bonds non existing or fake device. This flaw allows a local user to crash the system, causing a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Local denial of service in bond_ipsec_add_sa",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0286"
},
{
"category": "external",
"summary": "RHBZ#2037019",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037019"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0286"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0286"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=105cd17a866017b45f3c45901b394c711c97bf40"
}
],
"release_date": "2021-07-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent the module bonding from being loaded. Please see https://access.redhat.com/solutions/41278 for information on how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: Local denial of service in bond_ipsec_add_sa"
},
{
"cve": "CVE-2022-0322",
"cwe": {
"id": "CWE-681",
"name": "Incorrect Conversion between Numeric Types"
},
"discovery_date": "2021-12-16T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2042822"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sctp_make_strreset_req function in net/sctp/sm_make_chunk.c in the SCTP network protocol in the Linux kernel with a local user privilege access. In this flaw, an attempt to use more buffer than is allocated triggers a BUG_ON issue, leading to a denial of service (DOS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0322"
},
{
"category": "external",
"summary": "RHBZ#2042822",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2042822"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0322"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a2d859e3fc97e79d907761550dbc03ff1b36479c"
}
],
"release_date": "2021-10-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is to skip loading the affected module SCTP onto the system. Until we have a fix available, this can be done by a blacklist mechanism and will ensure the driver is not loaded at the boot time.\n~~~\nHow do I blacklist a kernel module to prevent it from loading automatically?\nhttps://access.redhat.com/solutions/41278 \n~~~",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: DoS in sctp_addto_chunk in net/sctp/sm_make_chunk.c"
},
{
"acknowledgments": [
{
"names": [
"elijahbai"
],
"organization": "Tencent Security Yunding Lab"
}
],
"cve": "CVE-2022-0850",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-11-10T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2060606"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found via ext4_extent_header in fs/ext4/extents.c in the Linux kernel. This flaw could allow a local attacker to cause a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: information leak in copy_page_to_iter() in iov_iter.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-0850"
},
{
"category": "external",
"summary": "RHBZ#2060606",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2060606"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-0850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0850"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0850"
},
{
"category": "external",
"summary": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ce3aba43599f0b50adbebff133df8d08a3d5fffe"
},
{
"category": "external",
"summary": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8",
"url": "https://syzkaller.appspot.com/bug?id=78e9ad0e6952a3ca16e8234724b2fa92d041b9b8"
}
],
"release_date": "2021-05-06T19:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: information leak in copy_page_to_iter() in iov_iter.c"
},
{
"acknowledgments": [
{
"names": [
"Miklos Szeredi",
"Jann Horn"
]
}
],
"cve": "CVE-2022-1011",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064855"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in the Linux kernel\u2019s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the Red Hat Enterprise Linux the issue actual if fuse or fuse3 package is installed on the system and only privileged user can install it.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-1011"
},
{
"category": "external",
"summary": "RHBZ#2064855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064855"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1011"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-1011"
},
{
"category": "external",
"summary": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/",
"url": "https://lore.kernel.org/lkml/20220414110839.241541230@linuxfoundation.org/"
}
],
"release_date": "2022-03-07T10:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: FUSE allows UAF reads of write() buffers, allowing theft of (partial) /etc/shadow hashes"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3105",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153067"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3105"
},
{
"category": "external",
"summary": "RHBZ#2153067",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153067"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3105",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3105"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3105"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: RDMA/uverbs: NULL pointer dereference in uapi_finalize()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3106",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153066"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3106"
},
{
"category": "external",
"summary": "RHBZ#2153066",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153066"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3106",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3106"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3106"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: sfc_ef100: NULL pointer dereference in ef100_update_stats()"
},
{
"acknowledgments": [
{
"names": [
"Jiasheng Jiang"
]
}
],
"cve": "CVE-2022-3108",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2022-12-13T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2153052"
}
],
"notes": [
{
"category": "description",
"text": "An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3108"
},
{
"category": "external",
"summary": "RHBZ#2153052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153052"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3108"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3108"
}
],
"release_date": "2022-12-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: drm/amdkfd: NULL pointer dereference in kfd_parse_subtype_iolink()"
},
{
"cve": "CVE-2022-48771",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2024-06-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2293337"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability has been identified in the Linux kernel\u0027s VMware graphics driver (vmwgfx) driver. This flaw occurs during the usercopy operation for the fence_rep object. If this operation fails, it can leave a stale (dangling) file descriptor in the system\u0027s file descriptor table. This allows userland processes to reference an invalidated file object, ultimately leading to a use-after-free condition. Successful exploitation of this vulnerability could result in memory corruption, system instability, or a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48771"
},
{
"category": "external",
"summary": "RHBZ#2293337",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2293337"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48771",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48771"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024062011-CVE-2022-48771-2c90@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024062011-CVE-2022-48771-2c90@gregkh/T"
}
],
"release_date": "2024-06-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: drm/vmwgfx: Fix stale file descriptors on failed usercopy"
},
{
"cve": "CVE-2022-48904",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2024-08-22T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2307157"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/amd: Fix I/O page table memory leak\n\nThe current logic updates the I/O page table mode for the domain\nbefore calling the logic to free memory used for the page table.\nThis results in IOMMU page table memory leak, and can be observed\nwhen launching VM w/ pass-through devices.\n\nFix by freeing the memory used for page table before updating the mode.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: iommu/amd: Fix I/O page table memory leak",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is fixed in RHEL-8.6 and above (including RHEL 8.10)\n~~~\nin (rhel-8.6, rhel-8.7, rhel-8.8, rhel-8.9, rhel-8.10) iommu/amd: Fix I/O page table memory leak\n~~~",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-48904"
},
{
"category": "external",
"summary": "RHBZ#2307157",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2307157"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-48904",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48904"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48904",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48904"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48904-b02c@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2024082212-CVE-2022-48904-b02c@gregkh/T"
}
],
"release_date": "2024-08-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: iommu/amd: Fix I/O page table memory leak"
},
{
"cve": "CVE-2022-49227",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-02-26T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2347772"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: avoid kernel warning when changing RX ring parameters\n\nCalling ethtool changing the RX ring parameters like this:\n\n $ ethtool -G eth0 rx 1024\n\non igc triggers kernel warnings like this:\n\n[ 225.198467] ------------[ cut here ]------------\n[ 225.198473] Missing unregister, handled but fix driver\n[ 225.198485] WARNING: CPU: 7 PID: 959 at net/core/xdp.c:168\nxdp_rxq_info_reg+0x79/0xd0\n[...]\n[ 225.198601] Call Trace:\n[ 225.198604] \u003cTASK\u003e\n[ 225.198609] igc_setup_rx_resources+0x3f/0xe0 [igc]\n[ 225.198617] igc_ethtool_set_ringparam+0x30e/0x450 [igc]\n[ 225.198626] ethnl_set_rings+0x18a/0x250\n[ 225.198631] genl_family_rcv_msg_doit+0xca/0x110\n[ 225.198637] genl_rcv_msg+0xce/0x1c0\n[ 225.198640] ? rings_prepare_data+0x60/0x60\n[ 225.198644] ? genl_get_cmd+0xd0/0xd0\n[ 225.198647] netlink_rcv_skb+0x4e/0xf0\n[ 225.198652] genl_rcv+0x24/0x40\n[ 225.198655] netlink_unicast+0x20e/0x330\n[ 225.198659] netlink_sendmsg+0x23f/0x480\n[ 225.198663] sock_sendmsg+0x5b/0x60\n[ 225.198667] __sys_sendto+0xf0/0x160\n[ 225.198671] ? handle_mm_fault+0xb2/0x280\n[ 225.198676] ? do_user_addr_fault+0x1eb/0x690\n[ 225.198680] __x64_sys_sendto+0x20/0x30\n[ 225.198683] do_syscall_64+0x38/0x90\n[ 225.198687] entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 225.198693] RIP: 0033:0x7f7ae38ac3aa\n\nigc_ethtool_set_ringparam() copies the igc_ring structure but neglects to\nreset the xdp_rxq_info member before calling igc_setup_rx_resources().\nThis in turn calls xdp_rxq_info_reg() with an already registered xdp_rxq_info.\n\nMake sure to unregister the xdp_rxq_info structure first in\nigc_setup_rx_resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: igc: avoid kernel warning when changing RX ring parameters",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-49227"
},
{
"category": "external",
"summary": "RHBZ#2347772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2347772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-49227",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-49227"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49227-76b1@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025022622-CVE-2022-49227-76b1@gregkh/T"
}
],
"release_date": "2025-02-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: igc: avoid kernel warning when changing RX ring parameters"
},
{
"cve": "CVE-2022-50131",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2025-06-18T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2373502"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: mcp2221: prevent a buffer overflow in mcp_smbus_write()\n\nSmatch Warning:\ndrivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy()\n\u0027\u0026mcp-\u003etxbuf[5]\u0027 too small (59 vs 255)\ndrivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() \u0027buf\u0027\ntoo small (34 vs 255)\n\nThe \u0027len\u0027 variable can take a value between 0-255 as it can come from\ndata-\u003eblock[0] and it is user data. So add an bound check to prevent a\nbuffer overflow in memcpy().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: HID: mcp2221: prevent a buffer overflow in mcp_smbus_write()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50131"
},
{
"category": "external",
"summary": "RHBZ#2373502",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2373502"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50131"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50131",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50131"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-50131-4df3@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025061815-CVE-2022-50131-4df3@gregkh/T"
}
],
"release_date": "2025-06-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: HID: mcp2221: prevent a buffer overflow in mcp_smbus_write()"
},
{
"cve": "CVE-2022-50475",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-10-04T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2401529"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/core: Make sure \"ib_port\" is valid when access sysfs node\n\nThe \"ib_port\" structure must be set before adding the sysfs kobject,\nand reset after removing it, otherwise it may crash when accessing\nthe sysfs node:\n Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050\n Mem abort info:\n ESR = 0x96000006\n Exception class = DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n Data abort info:\n ISV = 0, ISS = 0x00000006\n CM = 0, WnR = 0\n user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000e85f5ba5\n [0000000000000050] pgd=0000000848fd9003, pud=000000085b387003, pmd=0000000000000000\n Internal error: Oops: 96000006 [#2] PREEMPT SMP\n Modules linked in: ib_umad(O) mlx5_ib(O) nfnetlink_cttimeout(E) nfnetlink(E) act_gact(E) cls_flower(E) sch_ingress(E) openvswitch(E) nsh(E) nf_nat_ipv6(E) nf_nat_ipv4(E) nf_conncount(E) nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) mst_pciconf(O) ipmi_devintf(E) ipmi_msghandler(E) ipmb_dev_int(OE) mlx5_core(O) mlxfw(O) mlxdevm(O) auxiliary(O) ib_uverbs(O) ib_core(O) mlx_compat(O) psample(E) sbsa_gwdt(E) uio_pdrv_genirq(E) uio(E) mlxbf_pmc(OE) mlxbf_gige(OE) mlxbf_tmfifo(OE) gpio_mlxbf2(OE) pwr_mlxbf(OE) mlx_trio(OE) i2c_mlxbf(OE) mlx_bootctl(OE) bluefield_edac(OE) knem(O) ip_tables(E) ipv6(E) crc_ccitt(E) [last unloaded: mst_pci]\n Process grep (pid: 3372, stack limit = 0x0000000022055c92)\n CPU: 5 PID: 3372 Comm: grep Tainted: G D OE 4.19.161-mlnx.47.gadcd9e3 #1\n Hardware name: https://www.mellanox.com BlueField SoC/BlueField SoC, BIOS BlueField:3.9.2-15-ga2403ab Sep 8 2022\n pstate: 40000005 (nZcv daif -PAN -UAO)\n pc : hw_stat_port_show+0x4c/0x80 [ib_core]\n lr : port_attr_show+0x40/0x58 [ib_core]\n sp : ffff000029f43b50\n x29: ffff000029f43b50 x28: 0000000019375000\n x27: ffff8007b821a540 x26: ffff000029f43e30\n x25: 0000000000008000 x24: ffff000000eaa958\n x23: 0000000000001000 x22: ffff8007a4ce3000\n x21: ffff8007baff8000 x20: ffff8007b9066ac0\n x19: ffff8007bae97578 x18: 0000000000000000\n x17: 0000000000000000 x16: 0000000000000000\n x15: 0000000000000000 x14: 0000000000000000\n x13: 0000000000000000 x12: 0000000000000000\n x11: 0000000000000000 x10: 0000000000000000\n x9 : 0000000000000000 x8 : ffff8007a4ce4000\n x7 : 0000000000000000 x6 : 000000000000003f\n x5 : ffff000000e6a280 x4 : ffff8007a4ce3000\n x3 : 0000000000000000 x2 : aaaaaaaaaaaaaaab\n x1 : ffff8007b9066a10 x0 : ffff8007baff8000\n Call trace:\n hw_stat_port_show+0x4c/0x80 [ib_core]\n port_attr_show+0x40/0x58 [ib_core]\n sysfs_kf_seq_show+0x8c/0x150\n kernfs_seq_show+0x44/0x50\n seq_read+0x1b4/0x45c\n kernfs_fop_read+0x148/0x1d8\n __vfs_read+0x58/0x180\n vfs_read+0x94/0x154\n ksys_read+0x68/0xd8\n __arm64_sys_read+0x28/0x34\n el0_svc_common+0x88/0x18c\n el0_svc_handler+0x78/0x94\n el0_svc+0x8/0xe8\n Code: f2955562 aa1603e4 aa1503e0 f9405683 (f9402861)",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: RDMA/core: Make sure \"ib_port\" is valid when access sysfs node",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue arises because sysfs attribute handlers fail to validate that the ib_port pointer is non-NULL before dereferencing it. When userspace accesses sysfs nodes under /sys/class/infiniband/ (such as port state, capabilities, or statistics), the kernel retrieves the associated port structure. During device removal or port state changes, the port structure can be freed while sysfs nodes still exist. If a sysfs read occurs during or after this removal, the code dereferences a NULL or freed ib_port pointer, causing a kernel crash. This can be triggered by simply reading sysfs attributes while removing or reconfiguring InfiniBand devices.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50475"
},
{
"category": "external",
"summary": "RHBZ#2401529",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2401529"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50475"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50475",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50475"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50475-b3ed@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100438-CVE-2022-50475-b3ed@gregkh/T"
}
],
"release_date": "2025-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: RDMA/core: Make sure \"ib_port\" is valid when access sysfs node"
},
{
"cve": "CVE-2022-50510",
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402300"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()\n\narm_smmu_pmu_init() won\u0027t remove the callback added by\ncpuhp_setup_state_multi() when platform_driver_register() failed. Remove\nthe callback by cpuhp_remove_multi_state() in fail path.\n\nSimilar to the handling of arm_ccn_init() in commit 26242b330093 (\"bus:\narm-ccn: Prevent hotplug callback leak\")",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "arm_smmu_pmu_init() added multi-CPU hotplug callbacks but did not remove them on a subsequent platform driver registration failure. The correction removes the registered callbacks in the failure path so that no dangling hotplug handlers remain after an init error.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50510"
},
{
"category": "external",
"summary": "RHBZ#2402300",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402300"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50510"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50510",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50510"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2022-50510-c055@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100701-CVE-2022-50510-c055@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module arm_smmuv3_pmu from being loaded. Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: perf/smmuv3: Fix hotplug callback leak in arm_smmu_pmu_init()"
},
{
"cve": "CVE-2022-50536",
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402257"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix repeated calls to sock_put() when msg has more_data\n\nIn tcp_bpf_send_verdict() redirection, the eval variable is assigned to\n__SK_REDIRECT after the apply_bytes data is sent, if msg has more_data,\nsock_put() will be called multiple times.\n\nWe should reset the eval variable to __SK_NONE every time more_data\nstarts.\n\nThis causes:\n\nIPv4: Attempt to release TCP socket in state 1 00000000b4c925d7\n------------[ cut here ]------------\nrefcount_t: addition on 0; use-after-free.\nWARNING: CPU: 5 PID: 4482 at lib/refcount.c:25 refcount_warn_saturate+0x7d/0x110\nModules linked in:\nCPU: 5 PID: 4482 Comm: sockhash_bypass Kdump: loaded Not tainted 6.0.0 #1\nHardware name: Red Hat KVM, BIOS 1.11.0-2.el7 04/01/2014\nCall Trace:\n \u003cTASK\u003e\n __tcp_transmit_skb+0xa1b/0xb90\n ? __alloc_skb+0x8c/0x1a0\n ? __kmalloc_node_track_caller+0x184/0x320\n tcp_write_xmit+0x22a/0x1110\n __tcp_push_pending_frames+0x32/0xf0\n do_tcp_sendpages+0x62d/0x640\n tcp_bpf_push+0xae/0x2c0\n tcp_bpf_sendmsg_redir+0x260/0x410\n ? preempt_count_add+0x70/0xa0\n tcp_bpf_send_verdict+0x386/0x4b0\n tcp_bpf_sendmsg+0x21b/0x3b0\n sock_sendmsg+0x58/0x70\n __sys_sendto+0xfa/0x170\n ? xfd_validate_state+0x1d/0x80\n ? switch_fpu_return+0x59/0xe0\n __x64_sys_sendto+0x24/0x30\n do_syscall_64+0x37/0x90\n entry_SYSCALL_64_after_hwframe+0x63/0xcd",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw arises because the verdict state was not reset at boundaries where additional message data arrives, causing the same socket reference to be dropped more than once. The fix resets the internal verdict state when handling continued data, preventing double release.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-50536"
},
{
"category": "external",
"summary": "RHBZ#2402257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402257"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-50536",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50536"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-50536",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-50536"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100754-CVE-2022-50536-baea@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100754-CVE-2022-50536-baea@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "To mitigate this issue, prevent module bpf from being loaded.\n Please see https://access.redhat.com/solutions/41278 for how to blacklist a kernel module to prevent it from loading automatically.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "kernel: bpf, sockmap: Fix repeated calls to sock_put() when msg has more_data"
},
{
"cve": "CVE-2023-0459",
"cwe": {
"id": "CWE-402",
"name": "Transmission of Private Resources into a New Sphere (\u0027Resource Leak\u0027)"
},
"discovery_date": "2023-06-21T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216383"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in copy_from_user in 64-bit versions of the Linux kernel. This flaw allows a local attacker to bypass the \"access_ok\" sanity check and pass a kernel pointer to copy_from_user(), resulting in kernel data leaking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: Copy_from_user on 64-bit versions may leak kernel information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-0459"
},
{
"category": "external",
"summary": "RHBZ#2216383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-0459",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0459"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0459"
},
{
"category": "external",
"summary": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c",
"url": "https://github.com/torvalds/linux/commit/4b842e4e25b12951fa10dedb4bc16bc47e3b850c"
}
],
"release_date": "2020-02-15T06:30:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: Copy_from_user on 64-bit versions may leak kernel information"
},
{
"cve": "CVE-2023-53649",
"cwe": {
"id": "CWE-771",
"name": "Missing Reference to Active Allocated Resource"
},
"discovery_date": "2025-10-07T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2402214"
}
],
"notes": [
{
"category": "description",
"text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf trace: Really free the evsel-\u003epriv area\n\nIn 3cb4d5e00e037c70 (\"perf trace: Free syscall tp fields in\nevsel-\u003epriv\") it only was freeing if strcmp(evsel-\u003etp_format-\u003esystem,\n\"syscalls\") returned zero, while the corresponding initialization of\nevsel-\u003epriv was being performed if it was _not_ zero, i.e. if the tp\nsystem wasn\u0027t \u0027syscalls\u0027.\n\nJust stop looking for that and free it if evsel-\u003epriv was set, which\nshould be equivalent.\n\nAlso use the pre-existing evsel_trace__delete() function.\n\nThis resolves these leaks, detected with:\n\n $ make EXTRA_CFLAGS=\"-fsanitize=address\" BUILD_BPF_SKEL=1 CORESIGHT=1 O=/tmp/build/perf-tools-next -C tools/perf install-bin\n\n =================================================================\n ==481565==ERROR: LeakSanitizer: detected memory leaks\n\n Direct leak of 40 byte(s) in 1 object(s) allocated from:\n #0 0x7f7343cba097 in calloc (/lib64/libasan.so.8+0xba097)\n #1 0x987966 in zalloc (/home/acme/bin/perf+0x987966)\n #2 0x52f9b9 in evsel_trace__new /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:307\n #3 0x52f9b9 in evsel__syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:333\n #4 0x52f9b9 in evsel__init_raw_syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:458\n #5 0x52f9b9 in perf_evsel__raw_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:480\n #6 0x540e8b in trace__add_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3212\n #7 0x540e8b in trace__run /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3891\n #8 0x540e8b in cmd_trace /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:5156\n #9 0x5ef262 in run_builtin /home/acme/git/perf-tools-next/tools/perf/perf.c:323\n #10 0x4196da in handle_internal_command /home/acme/git/perf-tools-next/tools/perf/perf.c:377\n #11 0x4196da in run_argv /home/acme/git/perf-tools-next/tools/perf/perf.c:421\n #12 0x4196da in main /home/acme/git/perf-tools-next/tools/perf/perf.c:537\n #13 0x7f7342c4a50f in __libc_start_call_main (/lib64/libc.so.6+0x2750f)\n\n Direct leak of 40 byte(s) in 1 object(s) allocated from:\n #0 0x7f7343cba097 in calloc (/lib64/libasan.so.8+0xba097)\n #1 0x987966 in zalloc (/home/acme/bin/perf+0x987966)\n #2 0x52f9b9 in evsel_trace__new /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:307\n #3 0x52f9b9 in evsel__syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:333\n #4 0x52f9b9 in evsel__init_raw_syscall_tp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:458\n #5 0x52f9b9 in perf_evsel__raw_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:480\n #6 0x540dd1 in trace__add_syscall_newtp /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3205\n #7 0x540dd1 in trace__run /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:3891\n #8 0x540dd1 in cmd_trace /home/acme/git/perf-tools-next/tools/perf/builtin-trace.c:5156\n #9 0x5ef262 in run_builtin /home/acme/git/perf-tools-next/tools/perf/perf.c:323\n #10 0x4196da in handle_internal_command /home/acme/git/perf-tools-next/tools/perf/perf.c:377\n #11 0x4196da in run_argv /home/acme/git/perf-tools-next/tools/perf/perf.c:421\n #12 0x4196da in main /home/acme/git/perf-tools-next/tools/perf/perf.c:537\n #13 0x7f7342c4a50f in __libc_start_call_main (/lib64/libc.so.6+0x2750f)\n\n SUMMARY: AddressSanitizer: 80 byte(s) leaked in 2 allocation(s).\n [root@quaco ~]#\n\nWith this we plug all leaks with \"perf trace sleep 1\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "kernel: perf trace: Really free the evsel-\u003epriv area",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The perf trace cleanup code contains inverted logic when freeing the evsel-\u003epriv area. Memory is allocated when the tracepoint system is not \"syscalls\", but the cleanup code only frees when it is \"syscalls\", creating a mismatch. This means memory allocated for non-syscall tracepoints is never released, causing a permanent leak with each perf trace invocation. The issue was detected using AddressSanitizer during testing and manifests as 40-byte leaks per event selector. While a single perf trace command leaks relatively small amounts of memory, repeated invocations or long-running trace sessions can accumulate significant memory consumption.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"known_not_affected": [
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-53649"
},
{
"category": "external",
"summary": "RHBZ#2402214",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402214"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-53649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53649"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-53649",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-53649"
},
{
"category": "external",
"summary": "https://lore.kernel.org/linux-cve-announce/2025100718-CVE-2023-53649-0a4a@gregkh/T",
"url": "https://lore.kernel.org/linux-cve-announce/2025100718-CVE-2023-53649-0a4a@gregkh/T"
}
],
"release_date": "2025-10-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:58:00+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nThe system must be rebooted for this update to take effect.",
"product_ids": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"BaseOS-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"BaseOS-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:bpftool-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.src",
"CRB-8.6.0.GA:kernel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-abi-stablelists-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-cross-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-core-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debug-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-debuginfo-common-aarch64-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-debuginfo-common-ppc64le-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-debuginfo-common-s390x-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-debuginfo-common-x86_64-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-doc-0:4.18.0-372.9.1.el8.noarch",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-headers-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-modules-extra-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-tools-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:kernel-tools-libs-devel-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:kernel-zfcpdump-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-core-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-devel-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:kernel-zfcpdump-modules-extra-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-0:4.18.0-372.9.1.el8.x86_64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.aarch64",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.ppc64le",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.s390x",
"CRB-8.6.0.GA:python3-perf-debuginfo-0:4.18.0-372.9.1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "kernel: perf trace: Really free the evsel-\u003epriv area"
}
]
}
msrc_cve-2021-43389
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-43389 An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-43389.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"tracking": {
"current_release_date": "2021-12-16T00:00:00.000Z",
"generator": {
"date": "2025-10-19T22:19:06.420Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-43389",
"initial_release_date": "2021-11-02T00:00:00.000Z",
"revision_history": [
{
"date": "2021-11-10T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2021-12-16T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added kernel to CBL-Mariner 2.0"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 kernel 5.10.78.1-1",
"product": {
"name": "\u003ccm1 kernel 5.10.78.1-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cm1 kernel 5.10.78.1-1",
"product": {
"name": "cm1 kernel 5.10.78.1-1",
"product_id": "16885"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 kernel 5.10.78.1-1",
"product": {
"name": "\u003ccbl2 kernel 5.10.78.1-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 kernel 5.10.78.1-1",
"product": {
"name": "cbl2 kernel 5.10.78.1-1",
"product_id": "16920"
}
}
],
"category": "product_name",
"name": "kernel"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 kernel 5.10.78.1-1 as a component of CBL Mariner 1.0",
"product_id": "16820-2"
},
"product_reference": "2",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 kernel 5.10.78.1-1 as a component of CBL Mariner 1.0",
"product_id": "16885-16820"
},
"product_reference": "16885",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kernel 5.10.78.1-1 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kernel 5.10.78.1-1 as a component of CBL Mariner 2.0",
"product_id": "16920-17086"
},
"product_reference": "16920",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43389",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"16885-16820",
"16920-17086"
],
"known_affected": [
"16820-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-43389 An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-43389.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2021-11-10T00:00:00.000Z",
"details": "5.10.78.1-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-2",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"16820-2",
"17086-1"
]
}
],
"title": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c."
}
]
}
fkie_cve-2021-43389
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.openwall.com/lists/oss-security/2021/11/05/1 | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=2013180 | Issue Tracking, Patch, Third Party Advisory | |
| cve@mitre.org | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 | Mailing List, Release Notes, Third Party Advisory | |
| cve@mitre.org | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d | Mailing List, Patch, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | Mailing List, Third Party Advisory | |
| cve@mitre.org | https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/ | ||
| cve@mitre.org | https://seclists.org/oss-sec/2021/q4/39 | Exploit, Mailing List, Third Party Advisory | |
| cve@mitre.org | https://www.debian.org/security/2022/dsa-5096 | Third Party Advisory | |
| cve@mitre.org | https://www.oracle.com/security-alerts/cpujul2022.html | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2021/11/05/1 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2013180 | Issue Tracking, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15 | Mailing List, Release Notes, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d | Mailing List, Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://seclists.org/oss-sec/2021/q4/39 | Exploit, Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5096 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.oracle.com/security-alerts/cpujul2022.html | Patch, Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| linux | linux_kernel | * | |
| redhat | enterprise_linux | 8.0 | |
| debian | debian_linux | 9.0 | |
| debian | debian_linux | 10.0 | |
| oracle | communications_cloud_native_core_binding_support_function | 22.1.3 | |
| oracle | communications_cloud_native_core_network_exposure_function | 22.1.1 | |
| oracle | communications_cloud_native_core_policy | 22.2.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DF5750B-219C-419D-8DD4-D9F958B68CD0",
"versionEndExcluding": "5.14.15",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6EDB6772-7FDB-45FF-8D72-952902A7EE56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9955F62A-75D3-4347-9AD3-5947FC365838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6D77C7-A2F4-4700-AB5A-3EC853496ECA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c."
},
{
"lang": "es",
"value": "Se ha detectado un problema en el kernel de Linux versiones anteriores a 5.14.15. Se presenta un fallo de \u00edndice de matriz fuera de l\u00edmites en la funci\u00f3n detach_capi_ctr en el archivo drivers/isdn/capi/kcapi.c"
}
],
"id": "CVE-2021-43389",
"lastModified": "2024-11-21T06:29:08.323",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-11-04T19:15:07.623",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/11/05/1"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Release Notes",
"Third Party Advisory"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"source": "cve@mitre.org",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/oss-sec/2021/q4/39"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5096"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/11/05/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Release Notes",
"Third Party Advisory"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA%40mail.gmail.com/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/oss-sec/2021/q4/39"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5096"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ghsa-7pcx-9wjr-42p4
Vulnerability from github
An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.
{
"affected": [],
"aliases": [
"CVE-2021-43389"
],
"database_specific": {
"cwe_ids": [
"CWE-125"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-11-04T19:15:00Z",
"severity": "MODERATE"
},
"details": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"id": "GHSA-7pcx-9wjr-42p4",
"modified": "2022-05-24T19:19:43Z",
"published": "2022-05-24T19:19:43Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"type": "WEB",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15"
},
{
"type": "WEB",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"type": "WEB",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com"
},
{
"type": "WEB",
"url": "https://seclists.org/oss-sec/2021/q4/39"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2022/dsa-5096"
},
{
"type": "WEB",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2021/11/05/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
opensuse-su-2021:1501-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n\nThe following non-security bugs were fixed:\n\n- ABI: sysfs-kernel-slab: Document some stats (git-fixes).\n- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).\n- ALSA: ua101: fix division by zero at probe (git-fixes).\n- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).\n- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).\n- ASoC: cs42l42: Correct some register default values (git-fixes).\n- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).\n- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).\n- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).\n- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).\n- ASoC: rockchip: Use generic dmaengine code (git-fixes).\n- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).\n- ath10k: fix control-message timeout (git-fixes).\n- ath10k: fix division by zero in send path (git-fixes).\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).\n- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).\n- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).\n- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).\n- bpf: Fix potential race in tail call compatibility check (git-fixes).\n- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).\n- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).\n- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).\n- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).\n- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).\n- config: disable unprivileged BPF by default (jsc#SLE-22573) Backport of mainline commit 8a03e56b253e (\u0027bpf: Disallow unprivileged bpf by default\u0027) only changes kconfig default, used e.g. for \u0027make oldconfig\u0027 when the config option is missing, but does not update our kernel configs used for build. Update also these to make sure unprivileged BPF is really disabled by default.\n- crypto: caam - disable pkc for non-E SoCs (git-fixes).\n- crypto: qat - detect PFVF collision after ACK (git-fixes).\n- crypto: qat - disregard spurious PFVF interrupts (git-fixes).\n- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).\n- drm/amdgpu: fix warning for overflow check (git-fixes).\n- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).\n- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).\n- drm/v3d: fix wait for TMU write combiner flush (git-fixes).\n- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).\n- Eradicate Patch-mainline: No The pre-commit check can reject this deprecated tag then.\n- exfat: fix erroneous discard when clear cluster bit (git-fixes).\n- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).\n- exfat: properly set s_time_gran (bsc#1192328).\n- exfat: truncate atimes to 2s granularity (bsc#1192328).\n- firmware/psci: fix application of sizeof to pointer (git-fixes).\n- Fix problem with missing installkernel on Tumbleweed.\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- fuse: fix page stealing (bsc#1192718).\n- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).\n- gpio: mpc8xxx: Use \u0027devm_gpiochip_add_data()\u0027 to simplify the code and avoid a leak (git-fixes).\n- HID: u2fzero: clarify error check and length calculations (git-fixes).\n- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).\n- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).\n- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).\n- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).\n- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).\n- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).\n- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).\n- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).\n- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).\n- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).\n- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).\n- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).\n- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).\n- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).\n- KVM: s390: index kvm-\u003earch.idle_mask by vcpu_idx (bsc#1133021).\n- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).\n- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- media: cedrus: Fix SUNXI tile size calculation (git-fixes).\n- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).\n- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).\n- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: add missing em28xx_close_extension (git-fixes).\n- media: em28xx: Do not use ops-\u003esuspend if it is NULL (git-fixes).\n- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).\n- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).\n- media: mtk-vpu: Fix a resource leak in the error handling path of \u0027mtk_vpu_probe()\u0027 (git-fixes).\n- media: mxl111sf: change mutex_init() location (git-fixes).\n- media: radio-wl1273: Avoid card name truncation (git-fixes).\n- media: si470x: Avoid card name truncation (git-fixes).\n- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).\n- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).\n- media: tm6000: Avoid card name truncation (git-fixes).\n- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).\n- memstick: avoid out-of-range warning (git-fixes).\n- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).\n- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).\n- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).\n- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).\n- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).\n- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).\n- mwifiex: fix division by zero in fw download path (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).\n- net: mscc: ocelot: fix hardware timestamp dequeue logic.\n- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).\n- nvme-pci: set min_align_mask (bsc#1191851).\n- ocfs2: do not zero pages beyond i_size (bsc#1190795).\n- ocfs2: fix data corruption on truncate (bsc#1190795).\n- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).\n- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).\n- PCI: aardvark: Do not unmask unused interrupts (git-fixes).\n- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).\n- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).\n- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).\n- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).\n- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).\n- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).\n- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).\n- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).\n- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).\n- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).\n- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).\n- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).\n- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).\n- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).\n- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).\n- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).\n- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).\n- printk/console: Allow to disable console output by using console=\u0027\u0027 or console=null (bsc#1192753).\n- printk: handle blank console arguments passed in (bsc#1192753).\n- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).\n- r8152: add a helper function about setting EEE (git-fixes).\n- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).\n- r8152: Disable PLA MCU clock speed down (git-fixes).\n- r8152: disable U2P3 for RTL8153B (git-fixes).\n- r8152: divide the tx and rx bottom functions (git-fixes).\n- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).\n- r8152: fix runtime resume for linking change (git-fixes).\n- r8152: replace array with linking list for rx information (git-fixes).\n- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).\n- r8152: saving the settings of EEE (git-fixes).\n- r8152: separate the rx buffer size (git-fixes).\n- r8152: use alloc_pages for rx buffer (git-fixes).\n- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).\n- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).\n- Revert \u0027ibmvnic: check failover_pending in login response\u0027 (bsc#1190523 ltc#194510).\n- Revert \u0027platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes\u0027 (git-fixes).\n- Revert \u0027r8152: adjust the settings about MAC clock speed down for RTL8153\u0027 (git-fixes).\n- Revert \u0027scsi: ufs: fix a missing check of devm_reset_control_get\u0027 (git-fixes).\n- Revert \u0027x86/kvm: fix vcpu-id indexed array sizes\u0027 (git-fixes).\n- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).\n- rsi: fix control-message timeout (git-fixes).\n- rsi: Fix module dev_oper_mode parameter description (git-fixes).\n- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- s390/qeth: fix deadlock during failing recovery (git-fixes).\n- s390/qeth: Fix deadlock in remove_discipline (git-fixes).\n- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).\n- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).\n- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).\n- scsi: core: Fix spelling in a source code comment (git-fixes).\n- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).\n- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).\n- scsi: dc395: Fix error case unwinding (git-fixes).\n- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).\n- scsi: FlashPoint: Rename si_flags field (git-fixes).\n- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).\n- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).\n- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).\n- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).\n- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).\n- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).\n- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).\n- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).\n- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).\n- scsi: snic: Fix an error message (git-fixes).\n- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).\n- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).\n- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).\n- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).\n- staging: r8712u: fix control-message timeout (git-fixes).\n- staging: rtl8192u: fix control-message timeouts (git-fixes).\n- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).\n- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).\n- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).\n- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).\n- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).\n- swiotlb: factor out a nr_slots helper (bsc#1191851).\n- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).\n- swiotlb: respect min_align_mask (bsc#1191851).\n- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).\n- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).\n- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- usb: gadget: hid: fix error code in do_config() (git-fixes).\n- USB: iowarrior: fix control-message timeouts (git-fixes).\n- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).\n- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).\n- usbnet: fix error return code in usbnet_probe() (git-fixes).\n- usbnet: sanity check for maxpacket (git-fixes).\n- USB: serial: keyspan: fix memleak on probe errors (git-fixes).\n- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).\n- virtio-gpu: fix possible memory allocation failure (git-fixes).\n- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two\u0027s complement (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1152489).\n- x86/msi: Force affinity setup before startup (bsc#1152489).\n- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).\n- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).\n- xen: Fix implicit type conversion (git-fixes).\n- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).\n- xfs: do not allow log writes if the data device is readonly (bsc#1192229).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1501",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1501-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1501-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1501-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5J6FJF42AOGK3VQ4EFVDHQENHCDEMVT3/"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1169263",
"url": "https://bugzilla.suse.com/1169263"
},
{
"category": "self",
"summary": "SUSE Bug 1170269",
"url": "https://bugzilla.suse.com/1170269"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1190523",
"url": "https://bugzilla.suse.com/1190523"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191851",
"url": "https://bugzilla.suse.com/1191851"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1191980",
"url": "https://bugzilla.suse.com/1191980"
},
{
"category": "self",
"summary": "SUSE Bug 1192045",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "self",
"summary": "SUSE Bug 1192229",
"url": "https://bugzilla.suse.com/1192229"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 1192273",
"url": "https://bugzilla.suse.com/1192273"
},
{
"category": "self",
"summary": "SUSE Bug 1192328",
"url": "https://bugzilla.suse.com/1192328"
},
{
"category": "self",
"summary": "SUSE Bug 1192718",
"url": "https://bugzilla.suse.com/1192718"
},
{
"category": "self",
"summary": "SUSE Bug 1192740",
"url": "https://bugzilla.suse.com/1192740"
},
{
"category": "self",
"summary": "SUSE Bug 1192745",
"url": "https://bugzilla.suse.com/1192745"
},
{
"category": "self",
"summary": "SUSE Bug 1192750",
"url": "https://bugzilla.suse.com/1192750"
},
{
"category": "self",
"summary": "SUSE Bug 1192753",
"url": "https://bugzilla.suse.com/1192753"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE Bug 1192802",
"url": "https://bugzilla.suse.com/1192802"
},
{
"category": "self",
"summary": "SUSE Bug 1192896",
"url": "https://bugzilla.suse.com/1192896"
},
{
"category": "self",
"summary": "SUSE Bug 1192906",
"url": "https://bugzilla.suse.com/1192906"
},
{
"category": "self",
"summary": "SUSE Bug 1192918",
"url": "https://bugzilla.suse.com/1192918"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0941 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-11-24T16:00:07Z",
"generator": {
"date": "2021-11-24T16:00:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1501-1",
"initial_release_date": "2021-11-24T16:00:07Z",
"revision_history": [
{
"date": "2021-11-24T16:00:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-lp152.106.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-lp152.106.1.noarch",
"product_id": "kernel-devel-5.3.18-lp152.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-lp152.106.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-lp152.106.1.noarch",
"product_id": "kernel-docs-5.3.18-lp152.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-lp152.106.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-lp152.106.1.noarch",
"product_id": "kernel-docs-html-5.3.18-lp152.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-lp152.106.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-lp152.106.1.noarch",
"product_id": "kernel-macros-5.3.18-lp152.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-lp152.106.1.noarch",
"product": {
"name": "kernel-source-5.3.18-lp152.106.1.noarch",
"product_id": "kernel-source-5.3.18-lp152.106.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-lp152.106.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debug-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-debug-5.3.18-lp152.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-lp152.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-default-5.3.18-lp152.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"product_id": "kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-lp152.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-lp152.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-lp152.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-lp152.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-preempt-5.3.18-lp152.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-lp152.106.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-lp152.106.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-lp152.106.1.x86_64",
"product_id": "kernel-syms-5.3.18-lp152.106.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-lp152.106.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-lp152.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-lp152.106.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-lp152.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-lp152.106.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-lp152.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-lp152.106.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-lp152.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-lp152.106.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch"
},
"product_reference": "kernel-source-5.3.18-lp152.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-lp152.106.1.noarch as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-lp152.106.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-lp152.106.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0941"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0941",
"url": "https://www.suse.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "SUSE Bug 1192045 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "external",
"summary": "SUSE Bug 1192048 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-24T16:00:07Z",
"details": "important"
}
],
"title": "CVE-2021-0941"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-24T16:00:07Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-24T16:00:07Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-24T16:00:07Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-24T16:00:07Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:kernel-debug-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-debug-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-base-rebuild-5.3.18-lp152.106.1.lp152.8.52.1.x86_64",
"openSUSE Leap 15.2:kernel-default-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-devel-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-docs-html-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-kvmsmall-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-kvmsmall-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-macros-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-obs-build-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-obs-qa-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-preempt-devel-5.3.18-lp152.106.1.x86_64",
"openSUSE Leap 15.2:kernel-source-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-source-vanilla-5.3.18-lp152.106.1.noarch",
"openSUSE Leap 15.2:kernel-syms-5.3.18-lp152.106.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-24T16:00:07Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
opensuse-su-2021:3806-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe SUSE Linux Enterprise 15 SP3 kernel for Azure was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- Unprivileged BPF has been disabled by default to reduce attack surface as too many security issues have happened in the past (jsc#SLE-22573)\n\n You can reenable via systemctl setting /proc/sys/kernel/unprivileged_bpf_disabled to 0. (kernel.unprivileged_bpf_disabled = 0)\n\n- CVE-2021-0941: In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1192045).\n- CVE-2021-31916: An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel A bound check failure allowed an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability (bnc#1192781).\n- CVE-2021-20322: Make the ipv4 and ipv6 ICMP exception caches less predictive to avoid information leaks about UDP ports in use. (bsc#1191790)\n- CVE-2021-34981: Fixed file refcounting in cmtp when cmtp_attach_device fails (bsc#1191961).\n- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n\nThe following non-security bugs were fixed:\n\n- ABI: sysfs-kernel-slab: Document some stats (git-fixes).\n- ALSA: hda: fix general protection fault in azx_runtime_idle (git-fixes).\n- ALSA: hda: Free card instance properly at probe errors (git-fixes).\n- ALSA: hda/realtek: Fix mic mute LED for the HP Spectre x360 14 (git-fixes).\n- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).\n- ALSA: hda: Use position buffer for SKL+ again (git-fixes).\n- ALSA: ua101: fix division by zero at probe (git-fixes).\n- ALSA: uapi: Fix a C++ style comment in asound.h (git-fixes).\n- ALSA: usb-audio: Add Audient iD14 to mixer map quirk table (git-fixes).\n- ALSA: usb-audio: Add minimal-mute notion in dB mapping table (bsc#1192375).\n- ALSA: usb-audio: Add Schiit Hel device to mixer map quirk table (git-fixes).\n- ALSA: usb-audio: Fix dB level of Bose Revolve+ SoundLink (bsc#1192375).\n- ALSA: usb-audio: Use int for dB map values (bsc#1192375).\n- ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE (bsc#1192473).\n- ASoC: cs42l42: Correct some register default values (git-fixes).\n- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).\n- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).\n- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).\n- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).\n- ASoC: rockchip: Use generic dmaengine code (git-fixes).\n- ASoC: SOF: topology: do not power down primary core during topology removal (git-fixes).\n- ASoC: topology: Fix stub for snd_soc_tplg_component_remove() (git-fixes).\n- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).\n- ath10k: fix control-message timeout (git-fixes).\n- ath10k: fix division by zero in send path (git-fixes).\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).\n- ath10k: sdio: Add missing BH locking around napi_schdule() (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- auxdisplay: ht16k33: Connect backlight to fbdev (git-fixes).\n- auxdisplay: ht16k33: Fix frame buffer device blanking (git-fixes).\n- auxdisplay: img-ascii-lcd: Fix lock-up when displaying empty string (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- blacklist.conf: 5c9d706f6133 (\u0027bpf: Fix BPF_LSM kconfig symbol dependency\u0027) Not needed since 30897832d8b9 (\u0027bpf: Allow local storage to be used from LSM programs\u0027) is not backported.\n- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).\n- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).\n- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22573)\n- bpf: Add kconfig knob for disabling unpriv bpf by default (jsc#SLE-22574)\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22573).\n- bpf: Disallow unprivileged bpf by default (jsc#SLE-22574).\n- bpf: Fix BPF_JIT kconfig symbol dependency (git-fixes jsc#SLE-22574).\n- bpf: Fix potential race in tail call compatibility check (git-fixes).\n- bpf, kconfig: Add consolidated menu entry for bpf with core options (jsc#SLE-22574).\n- btrfs: block-group: Rework documentation of check_system_chunk function (bsc#1192896).\n- btrfs: fix deadlock between chunk allocation and chunk btree modifications (bsc#1192896).\n- btrfs: fix memory ordering between normal and ordered work functions (git-fixes).\n- btrfs: update comments for chunk allocation -ENOSPC cases (bsc#1192896).\n- cgroup/cpuset: Change references of cpuset_mutex to cpuset_rwsem (git-fixes).\n- config: disable unprivileged BPF by default (jsc#SLE-22573)\n- crypto: caam - disable pkc for non-E SoCs (git-fixes).\n- crypto: qat - detect PFVF collision after ACK (git-fixes).\n- crypto: qat - disregard spurious PFVF interrupts (git-fixes).\n- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).\n- drm/amdgpu/display: add quirk handling for stutter mode (git-fixes).\n- drm/amdgpu: fix warning for overflow check (git-fixes).\n- drm/amdgpu/gmc6: fix DMA mask from 44 to 40 bits (git-fixes).\n- drm/i915: Introduce intel_hpd_hotplug_irqs() (bsc#1192758).\n- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).\n- drm/msm: potential error pointer dereference in init() (git-fixes).\n- drm/msm: uninitialized variable in msm_gem_import() (git-fixes).\n- drm: prevent spectre issue in vmw_execbuf_ioctl (bsc#1192802).\n- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).\n- drm/ttm: stop calling tt_swapin in vm_access (git-fixes).\n- drm/v3d: fix wait for TMU write combiner flush (git-fixes).\n- EDAC/amd64: Set proper family type for Family 19h Models 20h-2Fh (bsc#1192288).\n- EDAC/sb_edac: Fix top-of-high-memory value for Broadwell/Haswell (bsc#1152489).\n- Eradicate Patch-mainline: No The pre-commit check can reject this deprecated tag then.\n- exfat: fix erroneous discard when clear cluster bit (git-fixes).\n- exfat: handle wrong stream entry size in exfat_readdir() (git-fixes).\n- exfat: properly set s_time_gran (bsc#1192328).\n- exfat: truncate atimes to 2s granularity (bsc#1192328).\n- firmware/psci: fix application of sizeof to pointer (git-fixes).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- fuse: fix page stealing (bsc#1192718).\n- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).\n- gpio: mpc8xxx: Use \u0027devm_gpiochip_add_data()\u0027 to simplify the code and avoid a leak (git-fixes).\n- gpio/rockchip: add driver for rockchip gpio (bsc#1192217).\n- gpio/rockchip: drop irq_gc_lock/irq_gc_unlock for irq set type (bsc#1192217).\n- gpio/rockchip: extended debounce support is only available on v2 (bsc#1192217).\n- gpio/rockchip: fetch deferred output settings on probe (bsc#1192217).\n- gpio/rockchip: fix get_direction value handling (bsc#1192217).\n- gpio/rockchip: support next version gpio controller (bsc#1192217).\n- gpio/rockchip: use struct rockchip_gpio_regs for gpio controller (bsc#1192217).\n- gve: Avoid freeing NULL pointer (git-fixes).\n- gve: Correct available tx qpl check (git-fixes).\n- gve: fix gve_get_stats() (git-fixes).\n- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).\n- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).\n- HID: u2fzero: clarify error check and length calculations (git-fixes).\n- HID: u2fzero: properly handle timeouts in usb_submit_urb (git-fixes).\n- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).\n- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).\n- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).\n- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).\n- i40e: Fix ATR queue selection (git-fixes).\n- i40e: fix endless loop under rtnl (git-fixes).\n- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).\n- iavf: fix double unlock of crit_lock (git-fixes).\n- ibmvnic: check failover_pending in login response (bsc#1190523 ltc#194510).\n- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).\n- ibmvnic: do not stop queue in xmit (bsc#1192273 ltc#194629).\n- ibmvnic: Process crqs after enabling interrupts (bsc#1192273 ltc#194629).\n- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).\n- iio: dac: ad5446: Fix ad5622_write() return value (git-fixes).\n- Input: elantench - fix misreporting trackpoint coordinates (bsc#1192918).\n- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).\n- ionic: do not remove netdev-\u003edev_addr when syncing uc list (bsc#1167773).\n- iwlwifi: mvm: fix some kerneldoc issues (git-fixes).\n- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).\n- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).\n- kernel-*-subpackage: Add dependency on kernel scriptlets (bsc#1192740).\n- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).\n- KVM: s390: index kvm-\u003earch.idle_mask by vcpu_idx (bsc#1133021).\n- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).\n- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- media: cedrus: Fix SUNXI tile size calculation (git-fixes).\n- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).\n- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).\n- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: add missing em28xx_close_extension (git-fixes).\n- media: em28xx: Do not use ops-\u003esuspend if it is NULL (git-fixes).\n- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).\n- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).\n- media: mtk-vpu: Fix a resource leak in the error handling path of \u0027mtk_vpu_probe()\u0027 (git-fixes).\n- media: mxl111sf: change mutex_init() location (git-fixes).\n- media: radio-wl1273: Avoid card name truncation (git-fixes).\n- media: si470x: Avoid card name truncation (git-fixes).\n- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).\n- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).\n- media: tm6000: Avoid card name truncation (git-fixes).\n- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).\n- memstick: avoid out-of-range warning (git-fixes).\n- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).\n- mlx5: count all link events (git-fixes).\n- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).\n- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).\n- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).\n- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).\n- mm/hugetlb: initialize hugetlb_usage in mm_init (bsc#1192906).\n- Move upstreamed sound fix into sorted section\n- mt76: mt7615: fix endianness warning in mt7615_mac_write_txwi (git-fixes).\n- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).\n- mt76: mt7915: fix muar_idx in mt7915_mcu_alloc_sta_req() (git-fixes).\n- mt76: mt7915: fix possible infinite loop release semaphore (git-fixes).\n- mt76: mt7915: fix sta_rec_wtbl tag len (git-fixes).\n- mwifiex: fix division by zero in fw download path (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).\n- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).\n- net: dsa: felix: re-enable TX flow control in ocelot_port_flush() (git-fixes).\n- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).\n- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).\n- net/mlx4_en: Resolve bad operstate value (git-fixes).\n- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).\n- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).\n- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).\n- net: mscc: ocelot: fix hardware timestamp dequeue logic.\n- net: mscc: ocelot: warn when a PTP IRQ is raised for an unknown skb (git-fixes).\n- net/smc: Correct smc link connection counter in case of smc client (git-fixes).\n- net/smc: fix \u0027workqueue leaked lock\u0027 in smc_conn_abort_work (git-fixes).\n- nvme-pci: set min_align_mask (bsc#1191851).\n- ocfs2: do not zero pages beyond i_size (bsc#1190795).\n- ocfs2: fix data corruption on truncate (bsc#1190795).\n- PCI: aardvark: Do not clear status bits of masked interrupts (git-fixes).\n- PCI: aardvark: Do not spam about PIO Response Status (git-fixes).\n- PCI: aardvark: Do not unmask unused interrupts (git-fixes).\n- PCI: aardvark: Fix checking for link up via LTSSM state (git-fixes).\n- PCI: aardvark: Fix reporting Data Link Layer Link Active (git-fixes).\n- PCI: aardvark: Fix return value of MSI domain .alloc() method (git-fixes).\n- PCI: aardvark: Read all 16-bits from PCIE_MSI_PAYLOAD_REG (git-fixes).\n- PCI/ACPI: Check for _OSC support in acpi_pci_osc_control_set() (bsc#1169263).\n- PCI/ACPI: Clarify message about _OSC failure (bsc#1169263).\n- PCI/ACPI: Move _OSC query checks to separate function (bsc#1169263).\n- PCI/ACPI: Move supported and control calculations to separate functions (bsc#1169263).\n- PCI/ACPI: Remove OSC_PCI_SUPPORT_MASKS and OSC_PCI_CONTROL_MASKS (bsc#1169263).\n- PCI/ACPI: Remove unnecessary osc_lock (bsc#1169263).\n- PCI: pci-bridge-emul: Fix emulation of W1C bits (git-fixes).\n- PCI: uniphier: Serialize INTx masking/unmasking and fix the bit operation (git-fixes).\n- pinctrl: core: fix possible memory leak in pinctrl_enable() (git-fixes).\n- pinctrl: pinctrl-rockchip: Fix a bunch of kerneldoc misdemeanours (bsc#1192217).\n- pinctrl/rockchip: add a queue for deferred pin output settings on probe (bsc#1192217).\n- pinctrl/rockchip: add pinctrl device to gpio bank struct (bsc#1192217).\n- pinctrl: rockchip: add rk3308 SoC support (bsc#1192217).\n- pinctrl: rockchip: add support for rk3568 (bsc#1192217).\n- pinctrl/rockchip: always enable clock for gpio controller (bsc#1192217).\n- pinctrl: rockchip: clear int status when driver probed (bsc#1192217).\n- pinctrl: rockchip: create irq mapping in gpio_to_irq (bsc#1192217).\n- pinctrl: rockchip: do coding style for mux route struct (bsc#1192217).\n- pinctrl/rockchip: drop the gpio related codes (bsc#1192217).\n- pinctrl: rockchip: enable gpio pclk for rockchip_gpio_to_irq (bsc#1192217).\n- pinctrl: rockchip: make driver be tristate module (bsc#1192217).\n- pinctrl: rockchip: Replace HTTP links with HTTPS ones (bsc#1192217).\n- pinctrl: rockchip: return ENOMEM instead of EINVAL if allocation fails (bsc#1192217).\n- pinctrl/rockchip: separate struct rockchip_pin_bank to a head file (bsc#1192217).\n- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).\n- PM: sleep: Do not let \u0027syscore\u0027 devices runtime-suspend during system transitions (git-fixes).\n- power: supply: bq27xxx: Fix kernel crash on IRQ handler register error (git-fixes).\n- power: supply: max17042_battery: Prevent int underflow in set_soc_threshold (git-fixes).\n- power: supply: max17042_battery: use VFSOC for capacity when no rsns (git-fixes).\n- printk/console: Allow to disable console output by using console=\u0027\u0027 or console=null (bsc#1192753).\n- printk: handle blank console arguments passed in (bsc#1192753).\n- qed: Fix missing error code in qed_slowpath_start() (git-fixes).\n- qed: Handle management FW error (git-fixes).\n- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).\n- qtnfmac: fix potential Spectre vulnerabilities (bsc#1192802).\n- r8152: add a helper function about setting EEE (git-fixes).\n- r8152: Add macpassthru support for ThinkPad Thunderbolt 3 Dock Gen 2 (git-fixes).\n- r8152: Disable PLA MCU clock speed down (git-fixes).\n- r8152: disable U2P3 for RTL8153B (git-fixes).\n- r8152: divide the tx and rx bottom functions (git-fixes).\n- r8152: do not enable U1U2 with USB_SPEED_HIGH for RTL8153B (git-fixes).\n- r8152: fix runtime resume for linking change (git-fixes).\n- r8152: replace array with linking list for rx information (git-fixes).\n- r8152: reset flow control patch when linking on for RTL8153B (git-fixes).\n- r8152: saving the settings of EEE (git-fixes).\n- r8152: separate the rx buffer size (git-fixes).\n- r8152: use alloc_pages for rx buffer (git-fixes).\n- random: fix crash on multiple early calls to add_bootloader_randomness() (bsc#1184924)\n- README.BRANCH: Add Oscar Salvador as SLE15-SP3 maintainer\n- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).\n- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).\n- Revert \u0027ibmvnic: check failover_pending in login response\u0027 (bsc#1190523 ltc#194510).\n- Revert \u0027platform/x86: i2c-multi-instantiate: Do not create platform device for INT3515 ACPI nodes\u0027 (git-fixes).\n- Revert \u0027r8152: adjust the settings about MAC clock speed down for RTL8153\u0027 (git-fixes).\n- Revert \u0027scsi: ufs: fix a missing check of devm_reset_control_get\u0027 (git-fixes).\n- Revert \u0027x86/kvm: fix vcpu-id indexed array sizes\u0027 (git-fixes).\n- rndis_host: set proper input size for OID_GEN_PHYSICAL_MEDIUM request (git-fixes).\n- rsi: fix control-message timeout (git-fixes).\n- rsi: Fix module dev_oper_mode parameter description (git-fixes).\n- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- s390/dasd: fix use after free in dasd path handling (git-fixes).\n- s390/pci: fix use after free of zpci_dev (git-fixes).\n- s390/pci: fix zpci_zdev_put() on reserve (git-fixes).\n- s390/qeth: fix deadlock during failing recovery (git-fixes).\n- s390/qeth: Fix deadlock in remove_discipline (git-fixes).\n- s390/qeth: fix NULL deref in qeth_clear_working_pool_list() (git-fixes).\n- s390/topology: clear thread/group maps for offline cpus (git-fixes).\n- scsi: be2iscsi: Fix an error handling path in beiscsi_dev_probe() (git-fixes).\n- scsi: BusLogic: Fix missing pr_cont() use (git-fixes).\n- scsi: core: Fix spelling in a source code comment (git-fixes).\n- scsi: csiostor: Add module softdep on cxgb4 (git-fixes).\n- scsi: csiostor: Uninitialized data in csio_ln_vnp_read_cbfn() (git-fixes).\n- scsi: dc395: Fix error case unwinding (git-fixes).\n- scsi: fdomain: Fix error return code in fdomain_probe() (git-fixes).\n- scsi: FlashPoint: Rename si_flags field (git-fixes).\n- scsi: iscsi: Fix iface sysfs attr detection (git-fixes).\n- scsi: libsas: Use _safe() loop in sas_resume_port() (git-fixes).\n- scsi: mpt3sas: Fix error return value in _scsih_expander_add() (git-fixes).\n- scsi: qedf: Add pointer checks in qedf_update_link_speed() (git-fixes).\n- scsi: qedf: Fix error codes in qedf_alloc_global_queues() (git-fixes).\n- scsi: qedi: Fix error codes in qedi_alloc_global_queues() (git-fixes).\n- scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() (git-fixes).\n- scsi: qla2xxx: Make sure that aborted commands are freed (git-fixes).\n- scsi: smartpqi: Fix an error code in pqi_get_raid_map() (git-fixes).\n- scsi: snic: Fix an error message (git-fixes).\n- scsi: ufs-pci: Add quirk for broken auto-hibernate for Intel EHL (git-fixes).\n- scsi: ufs: ufshcd-pltfrm: Fix memory leak due to probe defer (git-fixes).\n- serial: 8250_dw: Drop wrong use of ACPI_PTR() (git-fixes).\n- serial: xilinx_uartps: Fix race condition causing stuck TX (git-fixes).\n- staging: r8712u: fix control-message timeout (git-fixes).\n- staging: rtl8192u: fix control-message timeouts (git-fixes).\n- stmmac: platform: Fix signedness bug in stmmac_probe_config_dt() (git-fixes).\n- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).\n- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).\n- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).\n- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).\n- swiotlb: factor out a nr_slots helper (bsc#1191851).\n- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).\n- swiotlb: respect min_align_mask (bsc#1191851).\n- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).\n- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).\n- tracing: Increase PERF_MAX_TRACE_SIZE to handle Sentinel1 and docker together (bsc#1192745).\n- Update config files: Add CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set\n- Update patches.suse/NFS-Do-uncached-readdir-when-we-re-seeking-a-cookie-.patch (bsc#1191628 bsc#1192549). dir_cookie is a pointer to the cookie in older kernels, not the cookie itself.\n- Update patch reference for AMDGPU fix (bsc#1180749)\n- usb: gadget: hid: fix error code in do_config() (git-fixes).\n- USB: iowarrior: fix control-message timeouts (git-fixes).\n- usb: max-3421: Use driver data instead of maintaining a list of bound devices (git-fixes).\n- usb: musb: Balance list entry in musb_gadget_queue (git-fixes).\n- usbnet: fix error return code in usbnet_probe() (git-fixes).\n- usbnet: sanity check for maxpacket (git-fixes).\n- USB: serial: keyspan: fix memleak on probe errors (git-fixes).\n- video: fbdev: chipsfb: use memset_io() instead of memset() (git-fixes).\n- virtio-gpu: fix possible memory allocation failure (git-fixes).\n- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two\u0027s complement (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1152489).\n- x86/msi: Force affinity setup before startup (bsc#1152489).\n- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).\n- x86/sme: Use #define USE_EARLY_PGTABLE_L5 in mem_encrypt_identity.c (bsc#1152489).\n- x86/xen: Mark cpu_bringup_and_idle() as dead_end_function (git-fixes).\n- xen: Fix implicit type conversion (git-fixes).\n- xen-pciback: Fix return in pm_ctrl_init() (git-fixes).\n- xfs: do not allow log writes if the data device is readonly (bsc#1192229).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-3806",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3806-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:3806-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:3806-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WLGTBAKURNXDJOZBJTW2QLXJEWT66GSC/"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1157177",
"url": "https://bugzilla.suse.com/1157177"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1169263",
"url": "https://bugzilla.suse.com/1169263"
},
{
"category": "self",
"summary": "SUSE Bug 1170269",
"url": "https://bugzilla.suse.com/1170269"
},
{
"category": "self",
"summary": "SUSE Bug 1176940",
"url": "https://bugzilla.suse.com/1176940"
},
{
"category": "self",
"summary": "SUSE Bug 1180749",
"url": "https://bugzilla.suse.com/1180749"
},
{
"category": "self",
"summary": "SUSE Bug 1184924",
"url": "https://bugzilla.suse.com/1184924"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1190523",
"url": "https://bugzilla.suse.com/1190523"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1191628",
"url": "https://bugzilla.suse.com/1191628"
},
{
"category": "self",
"summary": "SUSE Bug 1191790",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "self",
"summary": "SUSE Bug 1191851",
"url": "https://bugzilla.suse.com/1191851"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1191961",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "self",
"summary": "SUSE Bug 1191980",
"url": "https://bugzilla.suse.com/1191980"
},
{
"category": "self",
"summary": "SUSE Bug 1192045",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "self",
"summary": "SUSE Bug 1192217",
"url": "https://bugzilla.suse.com/1192217"
},
{
"category": "self",
"summary": "SUSE Bug 1192229",
"url": "https://bugzilla.suse.com/1192229"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 1192273",
"url": "https://bugzilla.suse.com/1192273"
},
{
"category": "self",
"summary": "SUSE Bug 1192288",
"url": "https://bugzilla.suse.com/1192288"
},
{
"category": "self",
"summary": "SUSE Bug 1192328",
"url": "https://bugzilla.suse.com/1192328"
},
{
"category": "self",
"summary": "SUSE Bug 1192375",
"url": "https://bugzilla.suse.com/1192375"
},
{
"category": "self",
"summary": "SUSE Bug 1192473",
"url": "https://bugzilla.suse.com/1192473"
},
{
"category": "self",
"summary": "SUSE Bug 1192549",
"url": "https://bugzilla.suse.com/1192549"
},
{
"category": "self",
"summary": "SUSE Bug 1192718",
"url": "https://bugzilla.suse.com/1192718"
},
{
"category": "self",
"summary": "SUSE Bug 1192740",
"url": "https://bugzilla.suse.com/1192740"
},
{
"category": "self",
"summary": "SUSE Bug 1192745",
"url": "https://bugzilla.suse.com/1192745"
},
{
"category": "self",
"summary": "SUSE Bug 1192750",
"url": "https://bugzilla.suse.com/1192750"
},
{
"category": "self",
"summary": "SUSE Bug 1192753",
"url": "https://bugzilla.suse.com/1192753"
},
{
"category": "self",
"summary": "SUSE Bug 1192758",
"url": "https://bugzilla.suse.com/1192758"
},
{
"category": "self",
"summary": "SUSE Bug 1192781",
"url": "https://bugzilla.suse.com/1192781"
},
{
"category": "self",
"summary": "SUSE Bug 1192802",
"url": "https://bugzilla.suse.com/1192802"
},
{
"category": "self",
"summary": "SUSE Bug 1192896",
"url": "https://bugzilla.suse.com/1192896"
},
{
"category": "self",
"summary": "SUSE Bug 1192906",
"url": "https://bugzilla.suse.com/1192906"
},
{
"category": "self",
"summary": "SUSE Bug 1192918",
"url": "https://bugzilla.suse.com/1192918"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-0941 page",
"url": "https://www.suse.com/security/cve/CVE-2021-0941/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20322 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20322/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-31916 page",
"url": "https://www.suse.com/security/cve/CVE-2021-31916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-11-25T13:19:51Z",
"generator": {
"date": "2021-11-25T13:19:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:3806-1",
"initial_release_date": "2021-11-25T13:19:51Z",
"revision_history": [
{
"date": "2021-11-25T13:19:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-azure-5.3.18-38.31.1.noarch",
"product": {
"name": "kernel-devel-azure-5.3.18-38.31.1.noarch",
"product_id": "kernel-devel-azure-5.3.18-38.31.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-azure-5.3.18-38.31.1.noarch",
"product": {
"name": "kernel-source-azure-5.3.18-38.31.1.noarch",
"product_id": "kernel-source-azure-5.3.18-38.31.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "cluster-md-kmp-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "dlm-kmp-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "gfs2-kmp-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-azure-5.3.18-38.31.1.x86_64",
"product_id": "kernel-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-devel-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-azure-devel-5.3.18-38.31.1.x86_64",
"product_id": "kernel-azure-devel-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-extra-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-azure-extra-5.3.18-38.31.1.x86_64",
"product_id": "kernel-azure-extra-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"product_id": "kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-azure-optional-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-azure-optional-5.3.18-38.31.1.x86_64",
"product_id": "kernel-azure-optional-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "kernel-syms-azure-5.3.18-38.31.1.x86_64",
"product_id": "kernel-syms-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "kselftests-kmp-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "ocfs2-kmp-azure-5.3.18-38.31.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-azure-5.3.18-38.31.1.x86_64",
"product": {
"name": "reiserfs-kmp-azure-5.3.18-38.31.1.x86_64",
"product_id": "reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-azure-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64"
},
"product_reference": "cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-azure-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64"
},
"product_reference": "dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-azure-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64"
},
"product_reference": "gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64"
},
"product_reference": "kernel-azure-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-devel-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64"
},
"product_reference": "kernel-azure-devel-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-extra-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64"
},
"product_reference": "kernel-azure-extra-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64"
},
"product_reference": "kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-azure-optional-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64"
},
"product_reference": "kernel-azure-optional-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-azure-5.3.18-38.31.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch"
},
"product_reference": "kernel-devel-azure-5.3.18-38.31.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-azure-5.3.18-38.31.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch"
},
"product_reference": "kernel-source-azure-5.3.18-38.31.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-azure-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64"
},
"product_reference": "kernel-syms-azure-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-azure-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64"
},
"product_reference": "kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-azure-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64"
},
"product_reference": "ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-azure-5.3.18-38.31.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
},
"product_reference": "reiserfs-kmp-azure-5.3.18-38.31.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-0941",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-0941"
}
],
"notes": [
{
"category": "general",
"text": "In bpf_skb_change_head of filter.c, there is a possible out of bounds read due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-154177719References: Upstream kernel",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-0941",
"url": "https://www.suse.com/security/cve/CVE-2021-0941"
},
{
"category": "external",
"summary": "SUSE Bug 1192045 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192045"
},
{
"category": "external",
"summary": "SUSE Bug 1192048 for CVE-2021-0941",
"url": "https://bugzilla.suse.com/1192048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:51Z",
"details": "important"
}
],
"title": "CVE-2021-0941"
},
{
"cve": "CVE-2021-20322",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20322"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20322",
"url": "https://www.suse.com/security/cve/CVE-2021-20322"
},
{
"category": "external",
"summary": "SUSE Bug 1191790 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191790"
},
{
"category": "external",
"summary": "SUSE Bug 1191813 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1191813"
},
{
"category": "external",
"summary": "SUSE Bug 1193290 for CVE-2021-20322",
"url": "https://bugzilla.suse.com/1193290"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:51Z",
"details": "important"
}
],
"title": "CVE-2021-20322"
},
{
"cve": "CVE-2021-31916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-31916"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds (OOB) memory write flaw was found in list_devices in drivers/md/dm-ioctl.c in the Multi-device driver module in the Linux kernel before 5.12. A bound check failure allows an attacker with special user (CAP_SYS_ADMIN) privilege to gain access to out-of-bounds memory leading to a system crash or a leak of internal kernel information. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-31916",
"url": "https://www.suse.com/security/cve/CVE-2021-31916"
},
{
"category": "external",
"summary": "SUSE Bug 1192781 for CVE-2021-31916",
"url": "https://bugzilla.suse.com/1192781"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:51Z",
"details": "moderate"
}
],
"title": "CVE-2021-31916"
},
{
"cve": "CVE-2021-34981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34981"
}
],
"notes": [
{
"category": "general",
"text": "Linux Kernel Bluetooth CMTP Module Double Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the CMTP module. The issue results from the lack of validating the existence of an object prior to performing further free operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the kernel. Was ZDI-CAN-11977.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34981",
"url": "https://www.suse.com/security/cve/CVE-2021-34981"
},
{
"category": "external",
"summary": "SUSE Bug 1191961 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1191961"
},
{
"category": "external",
"summary": "SUSE Bug 1192595 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1192595"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1212298 for CVE-2021-34981",
"url": "https://bugzilla.suse.com/1212298"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:51Z",
"details": "important"
}
],
"title": "CVE-2021-34981"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:51Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-extra-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-azure-optional-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-source-azure-5.3.18-38.31.1.noarch",
"openSUSE Leap 15.3:kernel-syms-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-38.31.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-38.31.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-25T13:19:51Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
opensuse-su-2021:3675-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for the Linux Kernel",
"title": "Title of the patch"
},
{
"category": "description",
"text": "\n\nThe following security bugs were fixed:\n\n- CVE-2021-3542: Fixed heap buffer overflow in firedtv driver (bsc#1186063).\n- CVE-2021-3655: Fixed a missing size validations on inbound SCTP packets, which may have allowed the kernel to read uninitialized memory (bsc#1188563).\n- CVE-2021-3715: Fixed a use-after-free in route4_change() in net/sched/cls_route.c (bsc#1190349).\n- CVE-2021-3760: Fixed a use-after-free vulnerability with the ndev-\u003erf_conn_info object (bsc#1190067).\n- CVE-2021-3772: Fixed sctp vtag check in sctp_sf_ootb (bsc#1190351).\n- CVE-2021-3896: Fixed a array-index-out-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c (bsc#1191958).\n- CVE-2021-33033: Fixed a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled (bsc#1186109).\n- CVE-2021-34866: Fixed eBPF Type Confusion Privilege Escalation Vulnerability (bsc#1191645).\n- CVE-2021-37159: hso_free_net_device in drivers/net/usb/hso.c called without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free (bnc#1188601).\n- CVE-2021-41864: Fixed prealloc_elems_and_freelist that allowed unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write (bnc#1191317).\n- CVE-2021-42008: Fixed a slab out-of-bounds write in the decode_data function in drivers/net/hamradio/6pack.c. Input from a process that had the CAP_NET_ADMIN capability could have lead to root access (bsc#1191315).\n- CVE-2021-42252: Fixed an issue inside aspeed_lpc_ctrl_mmap that could have allowed local attackers to access the Aspeed LPC control interface to overwrite memory in the kernel and potentially execute privileges (bnc#1190479).\n- CVE-2021-42739: The firewire subsystem had a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandled bounds checking (bsc#1184673).\n- CVE-2021-43056: Fixed possible KVM host crash via malicious KVM guest on Power8 (bnc#1192107).\n- CVE-2021-43389: There was an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c (bnc#1191958).\n\nThe following non-security bugs were fixed:\n\n- acpi/arm64: fix next_platform_timer() section mismatch error (git-fixes).\n- ACPI: bgrt: Fix CFI violation (git-fixes).\n- ACPI: fix NULL pointer dereference (git-fixes).\n- ACPI: NFIT: Use fallback node id when numa info in NFIT table is incorrect (git-fixes).\n- Add obsolete_rebuilds_subpackage (boo#1172073 bsc#1191731).\n- ALSA: hda: avoid write to STATESTS if controller is in reset (git-fixes).\n- ALSA: hda - Enable headphone mic on Dell Latitude laptops with ALC3254 (git-fixes).\n- ALSA: hda: intel: Allow repeatedly probing on codec configuration errors (bsc#1190801).\n- ALSA: hda/realtek: Add quirk for Clevo PC50HS (git-fixes).\n- ALSA: hda/realtek: Add quirk for Clevo X170KM-G (git-fixes).\n- ALSA: hda/realtek: Add quirk for TongFang PHxTxX1 (git-fixes).\n- ALSA: hda/realtek - ALC236 headset MIC recording issue (git-fixes).\n- ALSA: hda/realtek: Complete partial device name to avoid ambiguity (git-fixes).\n- ALSA: hda/realtek: Enable 4-speaker output for Dell Precision 5560 laptop (git-fixes).\n- ALSA: hda/realtek: Fix for quirk to enable speaker output on the Lenovo 13s Gen2 (git-fixes).\n- ALSA: hda/realtek: Fix mic mute LED for the HP Spectre x360 14 (git-fixes).\n- ALSA: hda/realtek: Fix the mic type detection issue for ASUS G551JW (git-fixes).\n- ALSA: hda/realtek: Quirks to enable speaker output for Lenovo Legion 7i 15IMHG05, Yoga 7i 14ITL5/15ITL5, and 13s Gen2 laptops (git-fixes).\n- ALSA: hda: Reduce udelay() at SKL+ position reporting (git-fixes).\n- ALSA: hda: Use position buffer for SKL+ again (git-fixes).\n- ALSA: pcm: Workaround for a wrong offset in SYNC_PTR compat ioctl (git-fixes).\n- ALSA: seq: Fix a potential UAF by wrong private_free call order (git-fixes).\n- ALSA: ua101: fix division by zero at probe (git-fixes).\n- ALSA: uapi: Fix a C++ style comment in asound.h (git-fixes).\n- ALSA: usb-audio: Add quirk for VF0770 (git-fixes).\n- ALSA: usb-audio: Provide quirk for Sennheiser GSP670 Headset (git-fixes).\n- ASoC: atmel: ATMEL drivers do not need HAS_DMA (git-fixes).\n- ASoC: cs42l42: Correct some register default values (git-fixes).\n- ASoC: cs42l42: Defer probe if request_threaded_irq() returns EPROBE_DEFER (git-fixes).\n- ASoC: cs42l42: Do not set defaults for volatile registers (git-fixes).\n- ASoC: DAPM: Fix missing kctl change notifications (git-fixes).\n- ASoC: dapm: use component prefix when checking widget names (git-fixes).\n- ASoC: dt-bindings: cs42l42: Correct description of ts-inv (git-fixes).\n- ASoC: fsl_spdif: register platform component before registering cpu dai (git-fixes).\n- ASoC: Intel: bytcr_rt5640: Move \u0027Platform Clock\u0027 routes to the maps for the matching in-/output (git-fixes).\n- ASoC: Intel: Skylake: Fix module configuration for KPB and MIXER (git-fixes).\n- ASoC: Intel: Skylake: Fix passing loadable flag for module (git-fixes).\n- ASoC: Intel: sof_sdw: tag SoundWire BEs as non-atomic (git-fixes).\n- ASoC: mediatek: mt8195: Remove unsued irqs_lock (git-fixes).\n- ASoC: rockchip: Use generic dmaengine code (git-fixes).\n- ASoC: SOF: imx: imx8: Bar index is only valid for IRAM and SRAM types (git-fixes).\n- ASoC: SOF: imx: imx8m: Bar index is only valid for IRAM and SRAM types (git-fixes).\n- ASoC: SOF: loader: release_firmware() on load failure to avoid batching (git-fixes).\n- ASoC: SOF: topology: do not power down primary core during topology removal (git-fixes).\n- ASoC: topology: Fix stub for snd_soc_tplg_component_remove() (git-fixes).\n- ASoC: wm8960: Fix clock configuration on slave mode (git-fixes).\n- ata: ahci_platform: fix null-ptr-deref in ahci_platform_enable_regulators() (git-fixes).\n- ata: sata_dwc_460ex: No need to call phy_exit() befre phy_init() (git-fixes).\n- ata: sata_mv: Fix the error handling of mv_chip_id() (git-fixes).\n- ath10k: fix control-message timeout (git-fixes).\n- ath10k: fix division by zero in send path (git-fixes).\n- ath10k: fix max antenna gain unit (git-fixes).\n- ath10k: Fix missing frame timestamp for beacon/probe-resp (git-fixes).\n- ath10k: sdio: Add missing BH locking around napi_schdule() (git-fixes).\n- ath6kl: fix control-message timeout (git-fixes).\n- ath6kl: fix division by zero in send path (git-fixes).\n- ath9k: Fix potential interrupt storm on queue reset (git-fixes).\n- audit: fix possible null-pointer dereference in audit_filter_rules (git-fixes).\n- b43: fix a lower bounds test (git-fixes).\n- b43legacy: fix a lower bounds test (git-fixes).\n- bfq: Remove merged request already in bfq_requests_merged() (bsc#1191456).\n- blk: Fix lock inversion between ioc lock and bfqd lock (bsc#1191456).\n- blktrace: Fix uaf in blk_trace access after removing by sysfs (bsc#1191452).\n- block: bfq: fix bfq_set_next_ioprio_data() (bsc#1191451).\n- Bluetooth: btmtkuart: fix a memleak in mtk_hci_wmt_sync (git-fixes).\n- Bluetooth: fix init and cleanup of sco_conn.timeout_work (git-fixes).\n- bnxt_en: Fix TX timeout when TX ring size is set to the smallest (git-fixes).\n- bnxt_en: make bnxt_free_skbs() safe to call after bnxt_free_mem() (jsc#SLE-16649).\n- bpf: Add bpf_patch_call_args prototype to include/linux/bpf.h (git-fixes).\n- bpf: Fix a typo of reuseport map in bpf.h (git-fixes).\n- bpf: Fix OOB read when printing XDP link fdinfo (git-fixes).\n- bpf: Fix up bpf_skb_adjust_room helper\u0027s skb csum setting (git-fixes).\n- can: dev: can_restart: fix use after free bug (git-fixes).\n- can: peak_pci: peak_pci_remove(): fix UAF (git-fixes).\n- can: peak_usb: fix use after free bugs (git-fixes).\n- can: peak_usb: pcan_usb_fd_decode_status(): fix back to ERROR_ACTIVE state notification (git-fixes).\n- can: rcar_can: fix suspend/resume (git-fixes).\n- can: ti_hecc: ti_hecc_probe(): add missed clk_disable_unprepare() in error path (git-fixes).\n- can: xilinx_can: handle failure cases of pm_runtime_get_sync (git-fixes).\n- cb710: avoid NULL pointer subtraction (git-fixes).\n- ceph: fix handling of \u0027meta\u0027 errors (bsc#1192041).\n- ceph: skip existing superblocks that are blocklisted or shut down when mounting (bsc#1192040).\n- cfg80211: correct bridge/4addr mode check (git-fixes).\n- cfg80211: fix management registrations locking (git-fixes).\n- cfg80211: scan: fix RCU in cfg80211_add_nontrans_list() (git-fixes).\n- Configure mpi3mr as currently unsupported (jsc#SLE-18120)\n- cpuidle: pseries: Mark pseries_idle_proble() as __init (jsc#SLE-13614 bsc#1176914 ltc#186394 git-fixes).\n- driver core: add a min_align_mask field to struct device_dma_parameters (bsc#1191851).\n- drm/amd/display: Pass PCI deviceid into DC (git-fixes).\n- drm/amdgpu: correct initial cp_hqd_quantum for gfx9 (git-fixes).\n- drm/amdgpu/display: add quirk handling for stutter mode (git-fixes).\n- drm/amdgpu: fix gart.bo pin_count leak (git-fixes).\n- drm/amdgpu: fix warning for overflow check (git-fixes).\n- drm/amdgpu/gmc6: fix DMA mask from 44 to 40 bits (git-fixes).\n- drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read (git-fixes).\n- drm/i915: Fix syncmap memory leak (bsc#1152489) Backporting notes: \t* context changes in intel_timeline_fini()\n- drm/msm: Avoid potential overflow in timeout_to_jiffies() (git-fixes).\n- drm/msm/dsi: Fix an error code in msm_dsi_modeset_init() (git-fixes).\n- drm/msm/dsi: fix off by one in dsi_bus_clk_enable error handling (git-fixes).\n- drm/msm: Fix null pointer dereference on pointer edp (git-fixes).\n- drm/msm: Fix potential NULL dereference in DPU SSPP (git-fixes).\n- drm/msm: potential error pointer dereference in init() (git-fixes).\n- drm/msm: uninitialized variable in msm_gem_import() (git-fixes).\n- drm/nouveau: avoid a use-after-free when BO init fails (bsc#1152472)\n- drm/nouveau/debugfs: fix file release memory leak (git-fixes).\n- drm/nouveau/kms/nv50-: fix file release memory leak (git-fixes).\n- drm/nouveau/kms/tu102-: delay enabling cursor until after assign_windows (git-fixes).\n- drm/panel: olimex-lcd-olinuxino: select CRC32 (git-fixes).\n- drm/panfrost: Make sure MMU context lifetime is not bound to (bsc#1152472)\n- drm/sun4i: dw-hdmi: Fix HDMI PHY clock setup (git-fixes).\n- drm/sun4i: Fix macros in sun8i_csc.h (git-fixes).\n- drm/ttm: stop calling tt_swapin in vm_access (git-fixes).\n- drm/v3d: fix wait for TMU write combiner flush (git-fixes).\n- e1000e: Drop patch to avoid regressions until real fix is available (bsc#1191663).\n- e1000e: Fix packet loss on Tiger Lake and later (git-fixes).\n- e100: fix buffer overrun in e100_get_regs (git-fixes).\n- e100: fix length calculation in e100_get_regs_len (git-fixes).\n- e100: handle eeprom as little endian (git-fixes).\n- EDAC/amd64: Set proper family type for Family 19h Models 20h-2Fh (bsc#1192288).\n- ext4: fix reserved space counter leakage (bsc#1191450).\n- ext4: report correct st_size for encrypted symlinks (bsc#1191449).\n- firmware/psci: fix application of sizeof to pointer (git-fixes).\n- fscrypt: add fscrypt_symlink_getattr() for computing st_size (bsc#1191449).\n- fs, mm: fix race in unlinking swapfile (bsc#1191455).\n- ftrace: Fix scripts/recordmcount.pl due to new binutils (bsc#1192267).\n- genirq: Provide IRQCHIP_AFFINITY_PRE_STARTUP (bsc#1152489).\n- gpio: pca953x: Improve bias setting (git-fixes).\n- gve: Avoid freeing NULL pointer (git-fixes).\n- gve: Correct available tx qpl check (git-fixes).\n- gve: fix gve_get_stats() (git-fixes).\n- gve: Properly handle errors in gve_assign_qpl (bsc#1176940).\n- gve: report 64bit tx_bytes counter from gve_handle_report_stats() (bsc#1176940).\n- HID: apple: Fix logical maximum and usage maximum of Magic Keyboard JIS (git-fixes).\n- HID: betop: fix slab-out-of-bounds Write in betop_probe (git-fixes).\n- HID: u2fzero: ignore incomplete packets without data (git-fixes).\n- HID: usbhid: free raw_report buffers in usbhid_stop (git-fixes).\n- HID: wacom: Add new Intuos BT (CTL-4100WL/CTL-6100WL) device IDs (git-fixes).\n- hso: fix bailout in error case of probe (git-fixes).\n- hwmon: Fix possible memleak in __hwmon_device_register() (git-fixes).\n- hwmon: (pmbus/lm25066) Add offset coefficients (git-fixes).\n- hwmon: (pmbus/lm25066) Let compiler determine outer dimension of lm25066_coeff (git-fixes).\n- hwrng: mtk - Force runtime pm ops for sleep ops (git-fixes).\n- i2c: acpi: fix resource leak in reconfiguration device addition (git-fixes).\n- i40e: Fix ATR queue selection (git-fixes).\n- i40e: fix endless loop under rtnl (git-fixes).\n- i40e: Fix freeing of uninitialized misc IRQ vector (git-fixes).\n- iavf: fix double unlock of crit_lock (git-fixes).\n- ibmvnic: delay complete() (bsc#1094840 ltc#167098 git-fixes).\n- ice: Add missing E810 device ids (jsc#SLE-7966 bsc#1157177).\n- ice: fix getting UDP tunnel entry (jsc#SLE-12878).\n- ICMPv6: Add ICMPv6 Parameter Problem, code 3 definition (bsc#1191241).\n- iio: adc128s052: Fix the error handling path of \u0027adc128_probe()\u0027 (git-fixes).\n- iio: adc: aspeed: set driver data when adc probe (git-fixes).\n- iio: dac: ti-dac5571: fix an error code in probe() (git-fixes).\n- iio: light: opt3001: Fixed timeout error when 0 lux (git-fixes).\n- iio: mtk-auxadc: fix case IIO_CHAN_INFO_PROCESSED (git-fixes).\n- iio: ssp_sensors: add more range checking in ssp_parse_dataframe() (git-fixes).\n- iio: ssp_sensors: fix error code in ssp_print_mcu_debug() (git-fixes).\n- Input: i8042 - Add quirk for Fujitsu Lifebook T725 (bsc#1191980).\n- Input: snvs_pwrkey - add clk handling (git-fixes).\n- Input: xpad - add support for another USB ID of Nacon GC-100 (git-fixes).\n- ionic: do not remove netdev-\u003edev_addr when syncing uc list (bsc#1167773).\n- ipv6/netfilter: Discard first fragment not including all headers (bsc#1191241).\n- IPv6: reply ICMP error if the first fragment do not include all headers (bsc#1191241).\n- isdn: cpai: check ctr-\u003ecnr to avoid array index out of bound (git-fixes).\n- isdn: mISDN: Fix sleeping function called from invalid context (git-fixes).\n- iwlwifi: mvm: fix some kerneldoc issues (git-fixes).\n- iwlwifi: pcie: add configuration of a Wi-Fi adapter on Dell XPS 15 (git-fixes).\n- ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup (git-fixes).\n- kabi: block: Fix kabi of blk_mq_sched_try_insert_merge() (bsc#1191456).\n- kABI: Fix kABI after 36950f2da1ea (bsc#1191851).\n- kABI workaround for cfg80211 mgmt_registration_lock changes (git-fixes).\n- kABI workaround for HD-audio probe retry changes (bsc#1190801).\n- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167).\n- kernel-binary.spec: Do not sign kernel when no key provided (bsc#1187167 bsc#1191240 ltc#194716).\n- kernel-binary.spec: suse-kernel-rpm-scriptlets required for uninstall as well. Fixes: e98096d5cf85 (\u0027rpm: Abolish scritplet templating (bsc#1189841).\u0027)\n- kernel-spec-macros: Since rpm 4.17 %verbose is unusable (bsc#1191229). \n- KVM: PPC: Book3S HV: Fix copy_tofrom_guest routines (jsc#SLE-12936 git-fixes).\n- KVM: PPC: Book3S HV Nested: Reflect guest PMU in-use to L0 when guest SPRs are live (bsc#1156395).\n- KVM: PPC: Book3S HV Nested: Sanitise H_ENTER_NESTED TM state (bsc#1156395).\n- KVM: PPC: Book3S HV: Save host FSCR in the P7/8 path (bsc#1065729).\n- KVM: PPC: Book3S HV: Tolerate treclaim. in fake-suspend mode changing registers (bsc#1156395).\n- KVM: PPC: Fix clearing never mapped TCEs in realmode (bsc#1156395).\n- KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak (bsc#1156395).\n- KVM: s390: extend kvm_s390_shadow_fault to return entry pointer (bsc#1133021).\n- KVM: s390: index kvm-\u003earch.idle_mask by vcpu_idx (bsc#1133021).\n- KVM: s390: split kvm_s390_logical_to_effective (bsc#1133021).\n- KVM: s390: VSIE: correctly handle MVPG when in VSIE (bsc#1133021).\n- lan78xx: select CRC32 (git-fixes).\n- libata: Add ATA_HORKAGE_NO_NCQ_ON_ATI for Samsung 860 and 870 SSD (git-fixes).\n- libertas: Fix possible memory leak in probe and disconnect (git-fixes).\n- libertas_tf: Fix possible memory leak in probe and disconnect (git-fixes).\n- mac80211: check return value of rhashtable_init (git-fixes).\n- mac80211: Drop frames from invalid MAC address in ad-hoc mode (git-fixes).\n- media: cedrus: Fix SUNXI tile size calculation (git-fixes).\n- media: cx23885: Fix snd_card_free call on null card pointer (git-fixes).\n- media: cxd2880-spi: Fix a null pointer dereference on error handling path (git-fixes).\n- media: dvb-frontends: mn88443x: Handle errors of clk_prepare_enable() (git-fixes).\n- media: dvb-usb: fix ununit-value in az6027_rc_query (git-fixes).\n- media: em28xx: add missing em28xx_close_extension (git-fixes).\n- media: em28xx: Do not use ops-\u003esuspend if it is NULL (git-fixes).\n- media: i2c: ths8200 needs V4L2_ASYNC (git-fixes).\n- media: ite-cir: IR receiver stop working after receive overflow (git-fixes).\n- media: mtk-vpu: Fix a resource leak in the error handling path of \u0027mtk_vpu_probe()\u0027 (git-fixes).\n- media: mxl111sf: change mutex_init() location (git-fixes).\n- media: radio-wl1273: Avoid card name truncation (git-fixes).\n- media: si470x: Avoid card name truncation (git-fixes).\n- media: staging/intel-ipu3: css: Fix wrong size comparison imgu_css_fw_init (git-fixes).\n- media: TDA1997x: handle short reads of hdmi info frame (git-fixes).\n- media: tm6000: Avoid card name truncation (git-fixes).\n- media: v4l2-ioctl: Fix check_ext_ctrls (git-fixes).\n- media: v4l2-ioctl: S_CTRL output the right value (git-fixes).\n- mei: me: add Ice Lake-N device id (git-fixes).\n- memory: fsl_ifc: fix leak of irq and nand_irq in fsl_ifc_ctrl_probe (git-fixes).\n- memstick: avoid out-of-range warning (git-fixes).\n- memstick: jmb38x_ms: use appropriate free function in jmb38x_ms_alloc_host() (git-fixes).\n- mlx5: count all link events (git-fixes).\n- mlxsw: thermal: Fix out-of-bounds memory accesses (git-fixes).\n- mmc: dw_mmc: exynos: fix the finding clock sample value (git-fixes).\n- mmc: meson-gx: do not use memcpy_to/fromio for dram-access-quirk (git-fixes).\n- mmc: mxs-mmc: disable regulator on error and in the remove function (git-fixes).\n- mmc: sdhci: Map more voltage level to SDHCI_POWER_330 (git-fixes).\n- mmc: sdhci-omap: Fix NULL pointer exception if regulator is not configured (git-fixes).\n- mmc: vub300: fix control-message timeouts (git-fixes).\n- mt76: mt7615: fix endianness warning in mt7615_mac_write_txwi (git-fixes).\n- mt76: mt76x02: fix endianness warnings in mt76x02_mac.c (git-fixes).\n- mt76: mt7915: fix muar_idx in mt7915_mcu_alloc_sta_req() (git-fixes).\n- mt76: mt7915: fix possible infinite loop release semaphore (git-fixes).\n- mt76: mt7915: fix sta_rec_wtbl tag len (git-fixes).\n- mwifiex: fix division by zero in fw download path (git-fixes).\n- mwifiex: Send DELBA requests according to spec (git-fixes).\n- net/af_unix: fix a data-race in unix_dgram_poll (bsc#1154353).\n- net: batman-adv: fix error handling (git-fixes).\n- net: bridge: use nla_total_size_64bit() in br_get_linkxstats_size() (git-fixes).\n- net: can: ems_usb: fix use-after-free in ems_usb_disconnect() (git-fixes).\n- net: cdc_eem: fix tx fixup skb leak (git-fixes).\n- net: cdc_ncm: correct overhead in delayed_ndp_size (git-fixes).\n- netfilter: conntrack: collect all entries in one cycle (bsc#1173604).\n- netfilter: Drop fragmented ndisc packets assembled in netfilter (git-fixes).\n- netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value (bsc#1176447).\n- net: hns3: check queue id range before using (jsc#SLE-14777).\n- net: hns3: fix vf reset workqueue cannot exit (bsc#1154353).\n- net: hso: add failure handler for add_net_device (git-fixes).\n- net: hso: fix NULL-deref on disconnect regression (git-fixes).\n- net: hso: fix null-ptr-deref during tty device unregistration (git-fixes).\n- net: ipv6: Discard next-hop MTU less than minimum link MTU (bsc#1191241).\n- net: lan78xx: fix division by zero in send path (git-fixes).\n- net: mana: Fix error handling in mana_create_rxq() (git-fixes, bsc#1191800).\n- net/mlx4_en: Do not allow aRFS for encapsulated packets (git-fixes).\n- net/mlx4_en: Resolve bad operstate value (git-fixes).\n- net/mlx5e: IPSEC RX, enable checksum complete (jsc#SLE-15172).\n- net/mlx5e: Mutually exclude RX-FCS and RX-port-timestamp (git-fixes).\n- net/mlx5e: RX, Avoid possible data corruption when relaxed ordering and LRO combined (jsc#SLE-15172).\n- net/mlx5: E-Switch, Fix double allocation of acl flow counter (jsc#SLE-15172).\n- net/mlx5: Fix unpublish devlink parameters (jsc#SLE-8464).\n- net/mlx5: FWTrace, cancel work on alloc pd error flow (git-fixes).\n- net/sched: ets: fix crash when flipping from \u0027strict\u0027 to \u0027quantum\u0027 (bsc#1176774).\n- net: usb: Fix uninit-was-stored issue in asix_read_phy_addr() (git-fixes).\n- NFC: digital: fix possible memory leak in digital_in_send_sdd_req() (git-fixes).\n- NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() (git-fixes).\n- nfc: fix error handling of nfc_proto_register() (git-fixes).\n- nfc: port100: fix using -ERRNO as command type mask (git-fixes).\n- nfs: dir_cookie is a pointer to the cookie in older kernels, not the cookie itself. (bsc#1191628 bsc#1192549).\n- NFS: Do uncached readdir when we\u0027re seeking a cookie in an empty page cache (bsc#1191628).\n- nvme: add command id quirk for apple controllers (git-fixes).\n- nvme-fc: avoid race between time out and tear down (bsc#1185762).\n- nvme-fc: remove freeze/unfreeze around update_nr_hw_queues (bsc#1185762).\n- nvme-fc: update hardware queues before using them (bsc#1185762).\n- nvme-pci: Fix abort command id (git-fixes).\n- nvme-pci: fix error unwind in nvme_map_data (bsc#1191934).\n- nvme-pci: refactor nvme_unmap_data (bsc#1191934).\n- nvme-pci: set min_align_mask (bsc#1191851).\n- ocfs2: fix data corruption after conversion from inline format (bsc#1190795).\n- pata_legacy: fix a couple uninitialized variable bugs (git-fixes).\n- PCI: Fix pci_host_bridge struct device release/free handling (git-fixes).\n- phy: mdio: fix memory leak (git-fixes).\n- platform/mellanox: mlxreg-io: Fix argument base in kstrtou32() call (git-fixes).\n- platform/mellanox: mlxreg-io: Fix read access of n-bytes size attributes (git-fixes).\n- platform/x86: dell-smbios-wmi: Add missing kfree in error-exit from run_smbios_call (git-fixes).\n- platform/x86: intel_scu_ipc: Fix busy loop expiry time (git-fixes).\n- platform/x86: thinkpad_acpi: Fix bitwise vs. logical warning (git-fixes).\n- PM / devfreq: rk3399_dmc: Add missing of_node_put() (git-fixes).\n- PM / devfreq: rk3399_dmc: Disable devfreq-event device when fails (git-fixes).\n- PM / devfreq: rk3399_dmc: Fix kernel oops when rockchip,pmu is absent (git-fixes).\n- PM / devfreq: rk3399_dmc: Fix spelling typo (git-fixes).\n- PM / devfreq: rk3399_dmc: Remove unneeded semicolon (git-fixes).\n- PM: sleep: Do not let \u0027syscore\u0027 devices runtime-suspend during system transitions (git-fixes).\n- powerpc/64s: Fix entry flush patching w/strict RWX \u0026 hash (jsc#SLE-13847 git-fixes).\n- powerpc/64s: Fix stf mitigation patching w/strict RWX \u0026 hash (jsc#SLE-13847 git-fixes).\n- powerpc/64s: Remove irq mask workaround in accumulate_stolen_time() (jsc#SLE-9246 git-fixes).\n- powerpc/bpf: Fix BPF_MOD when imm == 1 (bsc#1065729).\n- powerpc/bpf: Fix BPF_SUB when imm == 0x80000000 (bsc#1065729).\n- powerpc/bpf: Use bctrl for making function calls (bsc#1065729).\n- powerpc: Do not dereference code as \u0027struct ppc_inst\u0027 (uprobe, code-patching, feature-fixups) (jsc#SLE-13847 git-fixes).\n- powerpc: Do not use \u0027struct ppc_inst\u0027 to reference instruction location (jsc#SLE-13847 git-fixes).\n- powerpc/lib/code-patching: Do not use struct \u0027ppc_inst\u0027 for runnable code in tests (jsc#SLE-13847 git-fixes).\n- powerpc/lib/code-patching: Make instr_is_branch_to_addr() static (jsc#SLE-13847 git-fixes).\n- powerpc/lib: Fix emulate_step() std test (bsc#1065729).\n- powerpc: Move arch_cpu_idle_dead() into smp.c (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/numa: Update cpu_cpu_map on CPU online/offline (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/pseries: Fix build error when NUMA=n (bsc#1190620 ltc#194498 git-fixes).\n- powerpc/smp: Cache CPU to chip lookup (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/smp: Enable CACHE domain for shared processor (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/smp: Fix a crash while booting kvm guest with nr_cpus=2 (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/smp: Fold cpu_die() into its only caller (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/smp: Set numa node before updating mask (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/smp: Update cpu_core_map on all PowerPc systems (jsc#SLE-13615 bsc#1180100 ltc#190257 git-fixes).\n- powerpc/uprobes: Validation for prefixed instruction (jsc#SLE-13847 git-fixes).\n- powerpc/xive: Discard disabled interrupts in get_irqchip_state() (bsc#1085030 git-fixes).\n- pseries/eeh: Fix the kdump kernel crash during eeh_pseries_init (git-fixes).\n- ptp_pch: Load module automatically if ID matches (git-fixes).\n- ptp_pch: Restore dependency on PCI (git-fixes).\n- qed: Fix missing error code in qed_slowpath_start() (git-fixes).\n- qed: Handle management FW error (git-fixes).\n- qed: rdma - do not wait for resources under hw error recovery flow (git-fixes).\n- RDMA/cma: Do not change route.addr.src_addr.ss_family (bsc#1181147).\n- RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure (bsc#1181147).\n- regmap: Fix possible double-free in regcache_rbtree_exit() (git-fixes).\n- regulator: dt-bindings: samsung,s5m8767: correct s5m8767,pmic-buck-default-dvs-idx property (git-fixes).\n- regulator: s5m8767: do not use reset value as DVS voltage if GPIO DVS is disabled (git-fixes).\n- rpm: fix kmp install path\n- rpm: use _rpmmacrodir (boo#1191384)\n- rsi: fix control-message timeout (git-fixes).\n- rsi: Fix module dev_oper_mode parameter description (git-fixes).\n- rsi: stop thread firstly in rsi_91x_init() error handling (git-fixes).\n- rtl8187: fix control-message timeouts (git-fixes).\n- scsi: ibmvfc: Fix up duplicate response detection (bsc#1191867 ltc#194757).\n- scsi: iscsi: Fix deadlock on recovery path during GFP_IO reclaim (git-fixes).\n- scsi: lpfc: Allow fabric node recovery if recovery is in progress before devloss (bsc#1192145).\n- scsi: lpfc: Allow PLOGI retry if previous PLOGI was aborted (bsc#1192145).\n- scsi: lpfc: Correct sysfs reporting of loop support after SFP status change (bsc#1192145).\n- scsi: lpfc: Fix link down processing to address NULL pointer dereference (bsc#1192145).\n- scsi: lpfc: Fix memory overwrite during FC-GS I/O abort handling (bsc#1191349).\n- scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine (bsc#1192145).\n- scsi: lpfc: Revert LOG_TRACE_EVENT back to LOG_INIT prior to driver_resource_setup() (bsc#1192145).\n- scsi: lpfc: Update lpfc version to 14.0.0.3 (bsc#1192145).\n- scsi: lpfc: Wait for successful restart of SLI3 adapter during host sg_reset (bsc#1192145).\n- scsi: mpi3mr: Add bios_param SCSI host template hook (jsc#SLE-18120).\n- scsi: mpi3mr: Add change queue depth support (jsc#SLE-18120).\n- scsi: mpi3mr: Add EEDP DIF DIX support (jsc#SLE-18120).\n- scsi: mpi3mr: Add event handling debug prints (jsc#SLE-18120).\n- scsi: mpi3mr: Additional event handling (jsc#SLE-18120).\n- scsi: mpi3mr: Add mpi30 Rev-R headers and Kconfig (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for device add/remove event handling (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for DSN secure firmware check (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for internal watchdog thread (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for PCIe device event handling (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for PM suspend and resume (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for queue command processing (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for recovering controller (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for threaded ISR (jsc#SLE-18120).\n- scsi: mpi3mr: Add support for timestamp sync with firmware (jsc#SLE-18120).\n- scsi: mpi3mr: Allow certain commands during pci-remove hook (jsc#SLE-18120).\n- scsi: mpi3mr: Base driver code (jsc#SLE-18120).\n- scsi: mpi3mr: Complete support for soft reset (jsc#SLE-18120).\n- scsi: mpi3mr: Create operational request and reply queue pair (jsc#SLE-18120).\n- scsi: mpi3mr: Fix error handling in mpi3mr_setup_isr() (git-fixes).\n- scsi: mpi3mr: Fix missing unlock on error (git-fixes).\n- scsi: mpi3mr: Hardware workaround for UNMAP commands to NVMe drives (jsc#SLE-18120).\n- scsi: mpi3mr: Implement SCSI error handler hooks (jsc#SLE-18120).\n- scsi: mpi3mr: Print IOC info for debugging (jsc#SLE-18120).\n- scsi: mpi3mr: Print pending host I/Os for debugging (jsc#SLE-18120).\n- scsi: mpi3mr: Set up IRQs in resume path (jsc#SLE-18120).\n- scsi: mpi3mr: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (jsc#SLE-18120).\n- scsi: mpi3mr: Use the proper SCSI midlayer interfaces for PI (jsc#SLE-18120).\n- scsi: mpi3mr: Wait for pending I/O completions upon detection of VD I/O timeout (jsc#SLE-18120).\n- scsi: qla2xxx: Add debug print of 64G link speed (bsc#1190941).\n- scsi: qla2xxx: Add host attribute to trigger MPI hang (bsc#1190941).\n- scsi: qla2xxx: Add support for mailbox passthru (bsc#1190941).\n- scsi: qla2xxx: Adjust request/response queue size for 28xx (bsc#1190941).\n- scsi: qla2xxx: Call process_response_queue() in Tx path (bsc#1190941).\n- scsi: qla2xxx: Changes to support FCP2 Target (bsc#1190941).\n- scsi: qla2xxx: Changes to support kdump kernel (bsc#1190941).\n- scsi: qla2xxx: Changes to support kdump kernel for NVMe BFS (bsc#1190941).\n- scsi: qla2xxx: Check for firmware capability before creating QPair (bsc#1190941).\n- scsi: qla2xxx: Display 16G only as supported speeds for 3830c card (bsc#1190941).\n- scsi: qla2xxx: Do not call fc_block_scsi_eh() during bus reset (bsc#1190941).\n- scsi: qla2xxx: edif: Add N2N support for EDIF (bsc#1190941).\n- scsi: qla2xxx: edif: Do secure PLOGI when auth app is present (bsc#1190941).\n- scsi: qla2xxx: edif: Fix EDIF enable flag (bsc#1190941).\n- scsi: qla2xxx: edif: Fix returnvar.cocci warnings (bsc#1190941).\n- scsi: qla2xxx: edif: Fix stale session (bsc#1190941).\n- scsi: qla2xxx: edif: Reject AUTH ELS on session down (bsc#1190941).\n- scsi: qla2xxx: edif: Use link event to wake up app (bsc#1190941).\n- scsi: qla2xxx: Fix crash in NVMe abort path (bsc#1190941).\n- scsi: qla2xxx: Fix excessive messages during device logout (bsc#1190941).\n- scsi: qla2xxx: Fix hang during NVMe session tear down (bsc#1190941).\n- scsi: qla2xxx: Fix hang on NVMe command timeouts (bsc#1190941).\n- scsi: qla2xxx: Fix kernel crash when accessing port_speed sysfs file (bsc#1190941).\n- scsi: qla2xxx: Fix NPIV create erroneous error (bsc#1190941).\n- scsi: qla2xxx: Fix NVMe | FCP personality change (bsc#1190941).\n- scsi: qla2xxx: Fix NVMe retry (bsc#1190941).\n- scsi: qla2xxx: Fix NVMe session down detection (bsc#1190941).\n- scsi: qla2xxx: Fix port type info (bsc#1190941).\n- scsi: qla2xxx: Fix unsafe removal from linked list (bsc#1190941).\n- scsi: qla2xxx: Fix use after free in eh_abort path (bsc#1190941).\n- scsi: qla2xxx: Move heartbeat handling from DPC thread to workqueue (bsc#1190941).\n- scsi: qla2xxx: Open-code qla2xxx_eh_device_reset() (bsc#1190941).\n- scsi: qla2xxx: Open-code qla2xxx_eh_target_reset() (bsc#1190941).\n- scsi: qla2xxx: Remove redundant initialization of pointer req (bsc#1190941).\n- scsi: qla2xxx: Restore initiator in dual mode (bsc#1190941).\n- scsi: qla2xxx: Show OS name and version in FDMI-1 (bsc#1190941).\n- scsi: qla2xxx: Suppress unnecessary log messages during login (bsc#1190941).\n- scsi: qla2xxx: Sync queue idx with queue_pair_map idx (bsc#1190941).\n- scsi: qla2xxx: Update version to 10.02.06.100-k (bsc#1190941).\n- scsi: qla2xxx: Update version to 10.02.06.200-k (bsc#1190941).\n- scsi: qla2xxx: Update version to 10.02.07.100-k (bsc#1190941).\n- scsi: qla2xxx: Use scsi_cmd_to_rq() instead of scsi_cmnd.request (bsc#1190941).\n- scsi: target: Fix the pgr/alua_support_store functions (git-fixes).\n- sctp: check asoc peer.asconf_capable before processing asconf (bsc#1190351).\n- soc: qcom: mdt_loader: Drop PT_LOAD check on hash segment (git-fixes).\n- spi: spi-nxp-fspi: do not depend on a specific node name erratum workaround (git-fixes).\n- swiotlb: add a IO_TLB_SIZE define (bsc#1191851).\n- swiotlb: clean up swiotlb_tbl_unmap_single (bsc#1191851).\n- swiotlb: do not modify orig_addr in swiotlb_tbl_sync_single (bsc#1191851).\n- swiotlb: factor out an io_tlb_offset helper (bsc#1191851).\n- swiotlb: factor out a nr_slots helper (bsc#1191851).\n- swiotlb: refactor swiotlb_tbl_map_single (bsc#1191851).\n- swiotlb: respect min_align_mask (bsc#1191851).\n- swiotlb: Split size parameter to map/unmap APIs (bsc#1191851).\n- tpm: Check for integer overflow in tpm2_map_response_body() (git-fixes).\n- tpm: ibmvtpm: Avoid error message when process gets signal while waiting (bsc#1065729).\n- Update patch reference for AMDGPU fix (bsc#1180749)\n- USB: cdc-acm: clean up probe error labels (git-fixes).\n- USB: cdc-acm: fix minor-number release (git-fixes).\n- usb: chipidea: ci_hdrc_imx: Also search for \u0027phys\u0027 phandle (git-fixes).\n- usb: hso: fix error handling code of hso_create_net_device (git-fixes).\n- usb: hso: remove the bailout parameter (git-fixes).\n- usb: musb: dsps: Fix the probe error path (git-fixes).\n- usbnet: fix error return code in usbnet_probe() (git-fixes).\n- usbnet: sanity check for maxpacket (git-fixes).\n- USB: serial: option: add prod. id for Quectel EG91 (git-fixes).\n- USB: serial: option: add Quectel EC200S-CN module support (git-fixes).\n- USB: serial: option: add Telit LE910Cx composition 0x1204 (git-fixes).\n- USB: serial: qcserial: add EM9191 QDL support (git-fixes).\n- USB: xhci: dbc: fix tty registration race (git-fixes).\n- video: fbdev: gbefb: Only instantiate device when built for IP32 (git-fixes).\n- virtio-gpu: fix possible memory allocation failure (git-fixes).\n- virtio: write back F_VERSION_1 before validate (git-fixes).\n- watchdog: orion: use 0 for unset heartbeat (git-fixes).\n- wcn36xx: Add ability for wcn36xx_smd_dump_cmd_req to pass two\u0027s complement (git-fixes).\n- wcn36xx: add proper DMA memory barriers in rx path (git-fixes).\n- wcn36xx: Fix HT40 capability for 2Ghz band (git-fixes).\n- x86/ioapic: Force affinity setup before startup (bsc#1152489).\n- x86/msi: Force affinity setup before startup (bsc#1152489).\n- x86/pat: Pass valid address to sanitize_phys() (bsc#1152489).\n- x86/reboot: Limit Dell Optiplex 990 quirk to early BIOS versions (bsc#1152489).\n- x86/resctrl: Free the ctrlval arrays when domain_setup_mon_state() fails (bsc#1152489).\n- x86/sev: Return an error on a returned non-zero SW_EXITINFO1[31:0] (bsc#1178134).\n- xen: fix setting of max_pfn in shared_info (git-fixes).\n- xen: reset legacy rtc flag for PV domU (git-fixes).\n- xfs: do not allow log writes if the data device is readonly (bsc#1192229).\n- xfs: ensure that the inode uid/gid match values match the icdinode ones (bsc#1190006).\n- xfs: Fixed non-directory creation in SGID directories introduced by CVE-2018-13405 patch (bsc#1190006). \n- xfs: fix I_DONTCACHE (bsc#1192074).\n- xfs: fix log intent recovery ENOSPC shutdowns when inactivating inodes (bsc#1190642).\n- xfs: merge the projid fields in struct xfs_icdinode (bsc#1190006).\n- xfs: remove the icdinode di_uid/di_gid members (bsc#1190006).\n- xhci: Enable trust tx length quirk for Fresco FL11 USB controller (git-fixes).\n- xhci: Fix command ring pointer corruption while aborting a command (git-fixes).\n- xhci: guard accesses to ep_state in xhci_endpoint_reset() (git-fixes).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-3675",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_3675-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:3675-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:3675-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YKWZ52CYLL6JHU7XBR4T2MCMZQTD4U57/"
},
{
"category": "self",
"summary": "SUSE Bug 1065729",
"url": "https://bugzilla.suse.com/1065729"
},
{
"category": "self",
"summary": "SUSE Bug 1085030",
"url": "https://bugzilla.suse.com/1085030"
},
{
"category": "self",
"summary": "SUSE Bug 1089118",
"url": "https://bugzilla.suse.com/1089118"
},
{
"category": "self",
"summary": "SUSE Bug 1094840",
"url": "https://bugzilla.suse.com/1094840"
},
{
"category": "self",
"summary": "SUSE Bug 1133021",
"url": "https://bugzilla.suse.com/1133021"
},
{
"category": "self",
"summary": "SUSE Bug 1152472",
"url": "https://bugzilla.suse.com/1152472"
},
{
"category": "self",
"summary": "SUSE Bug 1152489",
"url": "https://bugzilla.suse.com/1152489"
},
{
"category": "self",
"summary": "SUSE Bug 1154353",
"url": "https://bugzilla.suse.com/1154353"
},
{
"category": "self",
"summary": "SUSE Bug 1156395",
"url": "https://bugzilla.suse.com/1156395"
},
{
"category": "self",
"summary": "SUSE Bug 1157177",
"url": "https://bugzilla.suse.com/1157177"
},
{
"category": "self",
"summary": "SUSE Bug 1167773",
"url": "https://bugzilla.suse.com/1167773"
},
{
"category": "self",
"summary": "SUSE Bug 1172073",
"url": "https://bugzilla.suse.com/1172073"
},
{
"category": "self",
"summary": "SUSE Bug 1173604",
"url": "https://bugzilla.suse.com/1173604"
},
{
"category": "self",
"summary": "SUSE Bug 1176447",
"url": "https://bugzilla.suse.com/1176447"
},
{
"category": "self",
"summary": "SUSE Bug 1176774",
"url": "https://bugzilla.suse.com/1176774"
},
{
"category": "self",
"summary": "SUSE Bug 1176914",
"url": "https://bugzilla.suse.com/1176914"
},
{
"category": "self",
"summary": "SUSE Bug 1176940",
"url": "https://bugzilla.suse.com/1176940"
},
{
"category": "self",
"summary": "SUSE Bug 1178134",
"url": "https://bugzilla.suse.com/1178134"
},
{
"category": "self",
"summary": "SUSE Bug 1180100",
"url": "https://bugzilla.suse.com/1180100"
},
{
"category": "self",
"summary": "SUSE Bug 1180749",
"url": "https://bugzilla.suse.com/1180749"
},
{
"category": "self",
"summary": "SUSE Bug 1181147",
"url": "https://bugzilla.suse.com/1181147"
},
{
"category": "self",
"summary": "SUSE Bug 1184673",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "self",
"summary": "SUSE Bug 1185762",
"url": "https://bugzilla.suse.com/1185762"
},
{
"category": "self",
"summary": "SUSE Bug 1186063",
"url": "https://bugzilla.suse.com/1186063"
},
{
"category": "self",
"summary": "SUSE Bug 1186109",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "self",
"summary": "SUSE Bug 1187167",
"url": "https://bugzilla.suse.com/1187167"
},
{
"category": "self",
"summary": "SUSE Bug 1188563",
"url": "https://bugzilla.suse.com/1188563"
},
{
"category": "self",
"summary": "SUSE Bug 1188601",
"url": "https://bugzilla.suse.com/1188601"
},
{
"category": "self",
"summary": "SUSE Bug 1189841",
"url": "https://bugzilla.suse.com/1189841"
},
{
"category": "self",
"summary": "SUSE Bug 1190006",
"url": "https://bugzilla.suse.com/1190006"
},
{
"category": "self",
"summary": "SUSE Bug 1190067",
"url": "https://bugzilla.suse.com/1190067"
},
{
"category": "self",
"summary": "SUSE Bug 1190349",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "self",
"summary": "SUSE Bug 1190351",
"url": "https://bugzilla.suse.com/1190351"
},
{
"category": "self",
"summary": "SUSE Bug 1190479",
"url": "https://bugzilla.suse.com/1190479"
},
{
"category": "self",
"summary": "SUSE Bug 1190620",
"url": "https://bugzilla.suse.com/1190620"
},
{
"category": "self",
"summary": "SUSE Bug 1190642",
"url": "https://bugzilla.suse.com/1190642"
},
{
"category": "self",
"summary": "SUSE Bug 1190795",
"url": "https://bugzilla.suse.com/1190795"
},
{
"category": "self",
"summary": "SUSE Bug 1190801",
"url": "https://bugzilla.suse.com/1190801"
},
{
"category": "self",
"summary": "SUSE Bug 1190941",
"url": "https://bugzilla.suse.com/1190941"
},
{
"category": "self",
"summary": "SUSE Bug 1191229",
"url": "https://bugzilla.suse.com/1191229"
},
{
"category": "self",
"summary": "SUSE Bug 1191240",
"url": "https://bugzilla.suse.com/1191240"
},
{
"category": "self",
"summary": "SUSE Bug 1191241",
"url": "https://bugzilla.suse.com/1191241"
},
{
"category": "self",
"summary": "SUSE Bug 1191315",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "self",
"summary": "SUSE Bug 1191317",
"url": "https://bugzilla.suse.com/1191317"
},
{
"category": "self",
"summary": "SUSE Bug 1191349",
"url": "https://bugzilla.suse.com/1191349"
},
{
"category": "self",
"summary": "SUSE Bug 1191384",
"url": "https://bugzilla.suse.com/1191384"
},
{
"category": "self",
"summary": "SUSE Bug 1191449",
"url": "https://bugzilla.suse.com/1191449"
},
{
"category": "self",
"summary": "SUSE Bug 1191450",
"url": "https://bugzilla.suse.com/1191450"
},
{
"category": "self",
"summary": "SUSE Bug 1191451",
"url": "https://bugzilla.suse.com/1191451"
},
{
"category": "self",
"summary": "SUSE Bug 1191452",
"url": "https://bugzilla.suse.com/1191452"
},
{
"category": "self",
"summary": "SUSE Bug 1191455",
"url": "https://bugzilla.suse.com/1191455"
},
{
"category": "self",
"summary": "SUSE Bug 1191456",
"url": "https://bugzilla.suse.com/1191456"
},
{
"category": "self",
"summary": "SUSE Bug 1191628",
"url": "https://bugzilla.suse.com/1191628"
},
{
"category": "self",
"summary": "SUSE Bug 1191645",
"url": "https://bugzilla.suse.com/1191645"
},
{
"category": "self",
"summary": "SUSE Bug 1191663",
"url": "https://bugzilla.suse.com/1191663"
},
{
"category": "self",
"summary": "SUSE Bug 1191731",
"url": "https://bugzilla.suse.com/1191731"
},
{
"category": "self",
"summary": "SUSE Bug 1191800",
"url": "https://bugzilla.suse.com/1191800"
},
{
"category": "self",
"summary": "SUSE Bug 1191851",
"url": "https://bugzilla.suse.com/1191851"
},
{
"category": "self",
"summary": "SUSE Bug 1191867",
"url": "https://bugzilla.suse.com/1191867"
},
{
"category": "self",
"summary": "SUSE Bug 1191934",
"url": "https://bugzilla.suse.com/1191934"
},
{
"category": "self",
"summary": "SUSE Bug 1191958",
"url": "https://bugzilla.suse.com/1191958"
},
{
"category": "self",
"summary": "SUSE Bug 1191980",
"url": "https://bugzilla.suse.com/1191980"
},
{
"category": "self",
"summary": "SUSE Bug 1192040",
"url": "https://bugzilla.suse.com/1192040"
},
{
"category": "self",
"summary": "SUSE Bug 1192041",
"url": "https://bugzilla.suse.com/1192041"
},
{
"category": "self",
"summary": "SUSE Bug 1192074",
"url": "https://bugzilla.suse.com/1192074"
},
{
"category": "self",
"summary": "SUSE Bug 1192107",
"url": "https://bugzilla.suse.com/1192107"
},
{
"category": "self",
"summary": "SUSE Bug 1192145",
"url": "https://bugzilla.suse.com/1192145"
},
{
"category": "self",
"summary": "SUSE Bug 1192229",
"url": "https://bugzilla.suse.com/1192229"
},
{
"category": "self",
"summary": "SUSE Bug 1192267",
"url": "https://bugzilla.suse.com/1192267"
},
{
"category": "self",
"summary": "SUSE Bug 1192288",
"url": "https://bugzilla.suse.com/1192288"
},
{
"category": "self",
"summary": "SUSE Bug 1192549",
"url": "https://bugzilla.suse.com/1192549"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33033 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33033/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-34866 page",
"url": "https://www.suse.com/security/cve/CVE-2021-34866/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3542 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3542/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3655 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3655/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3715 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37159 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37159/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3760 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3772 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3896 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3896/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41864 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42008 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42252 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42252/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-42739 page",
"url": "https://www.suse.com/security/cve/CVE-2021-42739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43056 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-43389 page",
"url": "https://www.suse.com/security/cve/CVE-2021-43389/"
}
],
"title": "Security update for the Linux Kernel",
"tracking": {
"current_release_date": "2021-11-16T16:48:01Z",
"generator": {
"date": "2021-11-16T16:48:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:3675-1",
"initial_release_date": "2021-11-16T16:48:01Z",
"revision_history": [
{
"date": "2021-11-16T16:48:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "cluster-md-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "dlm-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "dlm-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "dlm-kmp-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-al-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-al-5.3.18-59.34.1.aarch64",
"product_id": "dtb-al-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-allwinner-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-allwinner-5.3.18-59.34.1.aarch64",
"product_id": "dtb-allwinner-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-altera-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-altera-5.3.18-59.34.1.aarch64",
"product_id": "dtb-altera-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amd-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-amd-5.3.18-59.34.1.aarch64",
"product_id": "dtb-amd-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-amlogic-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-amlogic-5.3.18-59.34.1.aarch64",
"product_id": "dtb-amlogic-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-apm-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-apm-5.3.18-59.34.1.aarch64",
"product_id": "dtb-apm-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-arm-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-arm-5.3.18-59.34.1.aarch64",
"product_id": "dtb-arm-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-broadcom-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-broadcom-5.3.18-59.34.1.aarch64",
"product_id": "dtb-broadcom-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-cavium-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-cavium-5.3.18-59.34.1.aarch64",
"product_id": "dtb-cavium-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-exynos-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-exynos-5.3.18-59.34.1.aarch64",
"product_id": "dtb-exynos-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-freescale-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-freescale-5.3.18-59.34.1.aarch64",
"product_id": "dtb-freescale-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-hisilicon-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-hisilicon-5.3.18-59.34.1.aarch64",
"product_id": "dtb-hisilicon-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-lg-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-lg-5.3.18-59.34.1.aarch64",
"product_id": "dtb-lg-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-marvell-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-marvell-5.3.18-59.34.1.aarch64",
"product_id": "dtb-marvell-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-mediatek-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-mediatek-5.3.18-59.34.1.aarch64",
"product_id": "dtb-mediatek-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-nvidia-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-nvidia-5.3.18-59.34.1.aarch64",
"product_id": "dtb-nvidia-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-qcom-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-qcom-5.3.18-59.34.1.aarch64",
"product_id": "dtb-qcom-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-renesas-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-renesas-5.3.18-59.34.1.aarch64",
"product_id": "dtb-renesas-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-rockchip-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-rockchip-5.3.18-59.34.1.aarch64",
"product_id": "dtb-rockchip-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-socionext-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-socionext-5.3.18-59.34.1.aarch64",
"product_id": "dtb-socionext-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-sprd-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-sprd-5.3.18-59.34.1.aarch64",
"product_id": "dtb-sprd-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-xilinx-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-xilinx-5.3.18-59.34.1.aarch64",
"product_id": "dtb-xilinx-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "dtb-zte-5.3.18-59.34.1.aarch64",
"product": {
"name": "dtb-zte-5.3.18-59.34.1.aarch64",
"product_id": "dtb-zte-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "gfs2-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "gfs2-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-64kb-5.3.18-59.34.1.aarch64",
"product_id": "kernel-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-64kb-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"product_id": "kernel-64kb-extra-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"product_id": "kernel-64kb-optional-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"product": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"product_id": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-extra-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-extra-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-livepatch-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-default-optional-5.3.18-59.34.1.aarch64",
"product_id": "kernel-default-optional-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-obs-build-5.3.18-59.34.1.aarch64",
"product_id": "kernel-obs-build-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.34.1.aarch64",
"product_id": "kernel-obs-qa-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-preempt-5.3.18-59.34.1.aarch64",
"product_id": "kernel-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-preempt-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"product_id": "kernel-preempt-extra-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"product_id": "kernel-preempt-optional-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.34.1.aarch64",
"product": {
"name": "kernel-syms-5.3.18-59.34.1.aarch64",
"product_id": "kernel-syms-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "kselftests-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "kselftests-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "ocfs2-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"product": {
"name": "reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"product_id": "reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"product_id": "reiserfs-kmp-default-5.3.18-59.34.1.aarch64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-devel-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-devel-5.3.18-59.34.1.noarch",
"product_id": "kernel-devel-5.3.18-59.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-docs-5.3.18-59.34.1.noarch",
"product_id": "kernel-docs-5.3.18-59.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-docs-html-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-docs-html-5.3.18-59.34.1.noarch",
"product_id": "kernel-docs-html-5.3.18-59.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-macros-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-macros-5.3.18-59.34.1.noarch",
"product_id": "kernel-macros-5.3.18-59.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-source-5.3.18-59.34.1.noarch",
"product_id": "kernel-source-5.3.18-59.34.1.noarch"
}
},
{
"category": "product_version",
"name": "kernel-source-vanilla-5.3.18-59.34.1.noarch",
"product": {
"name": "kernel-source-vanilla-5.3.18-59.34.1.noarch",
"product_id": "kernel-source-vanilla-5.3.18-59.34.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "cluster-md-kmp-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "dlm-kmp-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "gfs2-kmp-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-debug-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-debug-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-debug-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"product": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"product_id": "kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"product_id": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-extra-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-extra-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-livepatch-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-default-optional-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-default-optional-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-kvmsmall-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-obs-build-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-obs-build-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-obs-qa-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kernel-syms-5.3.18-59.34.1.ppc64le",
"product_id": "kernel-syms-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "kselftests-kmp-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "ocfs2-kmp-default-5.3.18-59.34.1.ppc64le"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"product_id": "reiserfs-kmp-default-5.3.18-59.34.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "cluster-md-kmp-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "dlm-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "dlm-kmp-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "gfs2-kmp-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"product": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"product_id": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"product_id": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-devel-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-devel-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-extra-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-extra-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-livepatch-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-default-optional-5.3.18-59.34.1.s390x",
"product_id": "kernel-default-optional-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-obs-build-5.3.18-59.34.1.s390x",
"product_id": "kernel-obs-build-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-obs-qa-5.3.18-59.34.1.s390x",
"product_id": "kernel-obs-qa-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-syms-5.3.18-59.34.1.s390x",
"product_id": "kernel-syms-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kernel-zfcpdump-5.3.18-59.34.1.s390x",
"product": {
"name": "kernel-zfcpdump-5.3.18-59.34.1.s390x",
"product_id": "kernel-zfcpdump-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "kselftests-kmp-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "ocfs2-kmp-default-5.3.18-59.34.1.s390x"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"product_id": "reiserfs-kmp-default-5.3.18-59.34.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "cluster-md-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "dlm-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "dlm-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "dlm-kmp-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "gfs2-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "gfs2-kmp-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-debug-5.3.18-59.34.1.x86_64",
"product_id": "kernel-debug-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-debug-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-debug-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"product": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"product_id": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"product": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"product_id": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-extra-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-extra-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-extra-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-livepatch-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-default-optional-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-default-optional-5.3.18-59.34.1.x86_64",
"product_id": "kernel-default-optional-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"product_id": "kernel-kvmsmall-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-build-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-obs-build-5.3.18-59.34.1.x86_64",
"product_id": "kernel-obs-build-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-obs-qa-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-obs-qa-5.3.18-59.34.1.x86_64",
"product_id": "kernel-obs-qa-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-preempt-5.3.18-59.34.1.x86_64",
"product_id": "kernel-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-preempt-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"product_id": "kernel-preempt-extra-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"product_id": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"product_id": "kernel-preempt-optional-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kernel-syms-5.3.18-59.34.1.x86_64",
"product": {
"name": "kernel-syms-5.3.18-59.34.1.x86_64",
"product_id": "kernel-syms-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "kselftests-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "kselftests-kmp-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "ocfs2-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"product": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"product_id": "reiserfs-kmp-default-5.3.18-59.34.1.x86_64"
}
},
{
"category": "product_version",
"name": "reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64",
"product": {
"name": "reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64",
"product_id": "reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64"
},
"product_reference": "cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-default-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64"
},
"product_reference": "cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-64kb-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64"
},
"product_reference": "dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "dlm-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-default-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "dlm-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dlm-kmp-preempt-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64"
},
"product_reference": "dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-al-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-al-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-allwinner-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-allwinner-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-altera-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-altera-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amd-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-amd-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-amlogic-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-amlogic-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-apm-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-apm-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-arm-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-arm-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-broadcom-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-broadcom-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-cavium-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-cavium-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-exynos-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-exynos-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-freescale-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-freescale-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-hisilicon-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-hisilicon-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-lg-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-lg-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-marvell-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-marvell-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-mediatek-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-mediatek-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-nvidia-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-nvidia-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-qcom-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-qcom-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-renesas-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-renesas-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-rockchip-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-rockchip-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-socionext-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-socionext-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-sprd-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-sprd-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-xilinx-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-xilinx-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dtb-zte-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64"
},
"product_reference": "dtb-zte-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-64kb-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64"
},
"product_reference": "gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-default-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gfs2-kmp-preempt-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64"
},
"product_reference": "gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-64kb-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-devel-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-extra-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-64kb-optional-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-debug-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-debug-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-devel-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-debug-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64"
},
"product_reference": "kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64"
},
"product_reference": "kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-default-devel-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-default-devel-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-devel-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-devel-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-default-extra-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-default-extra-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-extra-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-extra-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-extra-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-default-optional-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-default-optional-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-default-optional-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-default-optional-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-default-optional-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-5.3.18-59.34.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch"
},
"product_reference": "kernel-devel-5.3.18-59.34.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-5.3.18-59.34.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch"
},
"product_reference": "kernel-docs-5.3.18-59.34.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-docs-html-5.3.18-59.34.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch"
},
"product_reference": "kernel-docs-html-5.3.18-59.34.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-macros-5.3.18-59.34.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch"
},
"product_reference": "kernel-macros-5.3.18-59.34.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-obs-build-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-obs-build-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-obs-build-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-build-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-obs-build-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-obs-qa-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-obs-qa-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-obs-qa-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-preempt-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-preempt-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-devel-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-extra-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-preempt-optional-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-5.3.18-59.34.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch"
},
"product_reference": "kernel-source-5.3.18-59.34.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-source-vanilla-5.3.18-59.34.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch"
},
"product_reference": "kernel-source-vanilla-5.3.18-59.34.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64"
},
"product_reference": "kernel-syms-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kernel-syms-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-syms-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-syms-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64"
},
"product_reference": "kernel-syms-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-zfcpdump-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x"
},
"product_reference": "kernel-zfcpdump-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-64kb-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64"
},
"product_reference": "kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-default-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kselftests-kmp-preempt-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64"
},
"product_reference": "kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64"
},
"product_reference": "ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-default-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64"
},
"product_reference": "ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64"
},
"product_reference": "reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-default-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64"
},
"product_reference": "reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
},
"product_reference": "reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33033",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33033"
}
],
"notes": [
{
"category": "general",
"text": "The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33033",
"url": "https://www.suse.com/security/cve/CVE-2021-33033"
},
{
"category": "external",
"summary": "SUSE Bug 1186109 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186109"
},
{
"category": "external",
"summary": "SUSE Bug 1186283 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1186283"
},
{
"category": "external",
"summary": "SUSE Bug 1188876 for CVE-2021-33033",
"url": "https://bugzilla.suse.com/1188876"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "moderate"
}
],
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-34866",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-34866"
}
],
"notes": [
{
"category": "general",
"text": "This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel 5.14-rc3. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the handling of eBPF programs. The issue results from the lack of proper validation of user-supplied eBPF programs, which can result in a type confusion condition. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel. Was ZDI-CAN-14689.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-34866",
"url": "https://www.suse.com/security/cve/CVE-2021-34866"
},
{
"category": "external",
"summary": "SUSE Bug 1191645 for CVE-2021-34866",
"url": "https://bugzilla.suse.com/1191645"
},
{
"category": "external",
"summary": "SUSE Bug 1191646 for CVE-2021-34866",
"url": "https://bugzilla.suse.com/1191646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "important"
}
],
"title": "CVE-2021-34866"
},
{
"cve": "CVE-2021-3542",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3542"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-42739. Reason: This candidate is a reservation duplicate of CVE-2021-42739. Notes: All CVE users should reference CVE-2021-42739 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3542",
"url": "https://www.suse.com/security/cve/CVE-2021-3542"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1186063 for CVE-2021-3542",
"url": "https://bugzilla.suse.com/1186063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "important"
}
],
"title": "CVE-2021-3542"
},
{
"cve": "CVE-2021-3655",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3655"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in the Linux kernel in versions prior to v5.14-rc1. Missing size validations on inbound SCTP packets may allow the kernel to read uninitialized memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3655",
"url": "https://www.suse.com/security/cve/CVE-2021-3655"
},
{
"category": "external",
"summary": "SUSE Bug 1188563 for CVE-2021-3655",
"url": "https://bugzilla.suse.com/1188563"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "moderate"
}
],
"title": "CVE-2021-3655"
},
{
"cve": "CVE-2021-3715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3715"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the \"Routing decision\" classifier in the Linux kernel\u0027s Traffic Control networking subsystem in the way it handled changing of classification filters, leading to a use-after-free condition. This flaw allows unprivileged local users to escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3715",
"url": "https://www.suse.com/security/cve/CVE-2021-3715"
},
{
"category": "external",
"summary": "SUSE Bug 1190349 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190349"
},
{
"category": "external",
"summary": "SUSE Bug 1190350 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1190350"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-3715",
"url": "https://bugzilla.suse.com/1196722"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "important"
}
],
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-37159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37159"
}
],
"notes": [
{
"category": "general",
"text": "hso_free_net_device in drivers/net/usb/hso.c in the Linux kernel through 5.13.4 calls unregister_netdev without checking for the NETREG_REGISTERED state, leading to a use-after-free and a double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37159",
"url": "https://www.suse.com/security/cve/CVE-2021-37159"
},
{
"category": "external",
"summary": "SUSE Bug 1188601 for CVE-2021-37159",
"url": "https://bugzilla.suse.com/1188601"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "moderate"
}
],
"title": "CVE-2021-37159"
},
{
"cve": "CVE-2021-3760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3760"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux kernel. A use-after-free vulnerability in the NFC stack can lead to a threat to confidentiality, integrity, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3760",
"url": "https://www.suse.com/security/cve/CVE-2021-3760"
},
{
"category": "external",
"summary": "SUSE Bug 1190067 for CVE-2021-3760",
"url": "https://bugzilla.suse.com/1190067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "moderate"
}
],
"title": "CVE-2021-3760"
},
{
"cve": "CVE-2021-3772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3772"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the Linux SCTP stack. A blind attacker may be able to kill an existing SCTP association through invalid chunks if the attacker knows the IP-addresses and port numbers being used and the attacker can send packets with spoofed IP addresses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3772",
"url": "https://www.suse.com/security/cve/CVE-2021-3772"
},
{
"category": "external",
"summary": "SUSE Bug 1190351 for CVE-2021-3772",
"url": "https://bugzilla.suse.com/1190351"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "moderate"
}
],
"title": "CVE-2021-3772"
},
{
"cve": "CVE-2021-3896",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3896"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2021-43389. Reason: This candidate is a reservation duplicate of CVE-2021-43389. Notes: All CVE users should reference CVE-2021-43389 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3896",
"url": "https://www.suse.com/security/cve/CVE-2021-3896"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-3896",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "moderate"
}
],
"title": "CVE-2021-3896"
},
{
"cve": "CVE-2021-41864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41864"
}
],
"notes": [
{
"category": "general",
"text": "prealloc_elems_and_freelist in kernel/bpf/stackmap.c in the Linux kernel before 5.14.12 allows unprivileged users to trigger an eBPF multiplication integer overflow with a resultant out-of-bounds write.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41864",
"url": "https://www.suse.com/security/cve/CVE-2021-41864"
},
{
"category": "external",
"summary": "SUSE Bug 1191317 for CVE-2021-41864",
"url": "https://bugzilla.suse.com/1191317"
},
{
"category": "external",
"summary": "SUSE Bug 1191318 for CVE-2021-41864",
"url": "https://bugzilla.suse.com/1191318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "important"
}
],
"title": "CVE-2021-41864"
},
{
"cve": "CVE-2021-42008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42008"
}
],
"notes": [
{
"category": "general",
"text": "The decode_data function in drivers/net/hamradio/6pack.c in the Linux kernel before 5.13.13 has a slab out-of-bounds write. Input from a process that has the CAP_NET_ADMIN capability can lead to root access.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42008",
"url": "https://www.suse.com/security/cve/CVE-2021-42008"
},
{
"category": "external",
"summary": "SUSE Bug 1191315 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191315"
},
{
"category": "external",
"summary": "SUSE Bug 1191660 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1191660"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196810 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196810"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42008",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "important"
}
],
"title": "CVE-2021-42008"
},
{
"cve": "CVE-2021-42252",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42252"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in aspeed_lpc_ctrl_mmap in drivers/soc/aspeed/aspeed-lpc-ctrl.c in the Linux kernel before 5.14.6. Local attackers able to access the Aspeed LPC control interface could overwrite memory in the kernel and potentially execute privileges, aka CID-b49a0e69a7b1. This occurs because a certain comparison uses values that are not memory sizes.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42252",
"url": "https://www.suse.com/security/cve/CVE-2021-42252"
},
{
"category": "external",
"summary": "SUSE Bug 1190479 for CVE-2021-42252",
"url": "https://bugzilla.suse.com/1190479"
},
{
"category": "external",
"summary": "SUSE Bug 1192444 for CVE-2021-42252",
"url": "https://bugzilla.suse.com/1192444"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "important"
}
],
"title": "CVE-2021-42252"
},
{
"cve": "CVE-2021-42739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-42739"
}
],
"notes": [
{
"category": "general",
"text": "The firewire subsystem in the Linux kernel through 5.14.13 has a buffer overflow related to drivers/media/firewire/firedtv-avc.c and drivers/media/firewire/firedtv-ci.c, because avc_ca_pmt mishandles bounds checking.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-42739",
"url": "https://www.suse.com/security/cve/CVE-2021-42739"
},
{
"category": "external",
"summary": "SUSE Bug 1184673 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1184673"
},
{
"category": "external",
"summary": "SUSE Bug 1192036 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1192036"
},
{
"category": "external",
"summary": "SUSE Bug 1196722 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196722"
},
{
"category": "external",
"summary": "SUSE Bug 1196914 for CVE-2021-42739",
"url": "https://bugzilla.suse.com/1196914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "important"
}
],
"title": "CVE-2021-42739"
},
{
"cve": "CVE-2021-43056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43056"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel for powerpc before 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43056",
"url": "https://www.suse.com/security/cve/CVE-2021-43056"
},
{
"category": "external",
"summary": "SUSE Bug 1192107 for CVE-2021-43056",
"url": "https://bugzilla.suse.com/1192107"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "moderate"
}
],
"title": "CVE-2021-43056"
},
{
"cve": "CVE-2021-43389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-43389"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-43389",
"url": "https://www.suse.com/security/cve/CVE-2021-43389"
},
{
"category": "external",
"summary": "SUSE Bug 1191958 for CVE-2021-43389",
"url": "https://bugzilla.suse.com/1191958"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:cluster-md-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:cluster-md-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:cluster-md-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:dlm-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dlm-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:dtb-al-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-allwinner-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-altera-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-amlogic-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-apm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-arm-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-broadcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-cavium-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-exynos-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-freescale-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-hisilicon-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-lg-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-marvell-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-mediatek-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-nvidia-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-qcom-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-renesas-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-rockchip-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-socionext-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-sprd-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-xilinx-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:dtb-zte-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:gfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:gfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-64kb-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-debug-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.aarch64",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.s390x",
"openSUSE Leap 15.3:kernel-default-base-rebuild-5.3.18-59.34.1.18.21.1.x86_64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-default-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-devel-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-docs-html-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-kvmsmall-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-macros-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-build-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-obs-qa-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-extra-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-livepatch-devel-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-preempt-optional-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-source-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-source-vanilla-5.3.18-59.34.1.noarch",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kernel-syms-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kernel-zfcpdump-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:kselftests-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:kselftests-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:ocfs2-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:ocfs2-kmp-preempt-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-64kb-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.ppc64le",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.s390x",
"openSUSE Leap 15.3:reiserfs-kmp-default-5.3.18-59.34.1.x86_64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.aarch64",
"openSUSE Leap 15.3:reiserfs-kmp-preempt-5.3.18-59.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-11-16T16:48:01Z",
"details": "moderate"
}
],
"title": "CVE-2021-43389"
}
]
}
cnvd-2021-94150
Vulnerability from cnvd
厂商已发布了漏洞修复程序,请及时关注更新: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d
| Name | Linux Linux kernel <5.14.15 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-43389",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389"
}
},
"description": "Linux kernel\u662f\u4e00\u79cd\u8ba1\u7b97\u673a\u64cd\u4f5c\u7cfb\u7edf\u5185\u6838\uff0c\u4ee5C\u8bed\u8a00\u548c\u6c47\u7f16\u8bed\u8a00\u5199\u6210\uff0c\u7b26\u5408POSIX\u6807\u51c6\uff0c\u6309GNU\u901a\u7528\u516c\u5171\u8bb8\u53ef\u8bc1\u53d1\u884c\u3002\n\nLinux kernel 5.14.15\u4e4b\u524d\u7248\u672c\u4e2d\u7684drivers/isdn/capi/kcapi.c\u4e2d\u7684detach_capi_ctr\u51fd\u6570\u5b58\u5728\u6570\u7ec4\u7d22\u5f15\u8d8a\u754c\u6f0f\u6d1e\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-94150",
"openTime": "2021-12-03",
"patchDescription": "Linux kernel\u662f\u4e00\u79cd\u8ba1\u7b97\u673a\u64cd\u4f5c\u7cfb\u7edf\u5185\u6838\uff0c\u4ee5C\u8bed\u8a00\u548c\u6c47\u7f16\u8bed\u8a00\u5199\u6210\uff0c\u7b26\u5408POSIX\u6807\u51c6\uff0c\u6309GNU\u901a\u7528\u516c\u5171\u8bb8\u53ef\u8bc1\u53d1\u884c\u3002\r\n\r\nLinux kernel 5.14.15\u4e4b\u524d\u7248\u672c\u4e2d\u7684drivers/isdn/capi/kcapi.c\u4e2d\u7684detach_capi_ctr\u51fd\u6570\u5b58\u5728\u6570\u7ec4\u7d22\u5f15\u8d8a\u754c\u6f0f\u6d1e\u3002\u76ee\u524d\u6ca1\u6709\u8be6\u7ec6\u7684\u6f0f\u6d1e\u7ec6\u8282\u63d0\u4f9b\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Linux kernel\u6570\u7ec4\u7d22\u5f15\u8d8a\u754c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Linux Linux kernel \u003c5.14.15"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-43389",
"serverity": "\u4f4e",
"submitTime": "2021-11-05",
"title": "Linux kernel\u6570\u7ec4\u7d22\u5f15\u8d8a\u754c\u6f0f\u6d1e"
}
gsd-2021-43389
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2021-43389",
"description": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"id": "GSD-2021-43389",
"references": [
"https://www.suse.com/security/cve/CVE-2021-43389.html",
"https://www.debian.org/security/2022/dsa-5096",
"https://ubuntu.com/security/CVE-2021-43389",
"https://advisories.mageia.org/CVE-2021-43389.html",
"https://security.archlinux.org/CVE-2021-43389",
"https://linux.oracle.com/cve/CVE-2021-43389.html",
"https://access.redhat.com/errata/RHSA-2022:1975",
"https://access.redhat.com/errata/RHSA-2022:1988"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-43389"
],
"details": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c.",
"id": "GSD-2021-43389",
"modified": "2023-12-13T01:23:26.656931Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-43389",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15",
"refsource": "MISC",
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15"
},
{
"name": "https://seclists.org/oss-sec/2021/q4/39",
"refsource": "MISC",
"url": "https://seclists.org/oss-sec/2021/q4/39"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"refsource": "MISC",
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"name": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"refsource": "MISC",
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
},
{
"name": "[oss-security] 20211105 Re: Linux kernel: isdn: cpai: array-index-out-of-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2021/11/05/1"
},
{
"name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"name": "DSA-5096",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5096"
},
{
"name": "https://www.oracle.com/security-alerts/cpujul2022.html",
"refsource": "MISC",
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "5.14.15",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-43389"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An issue was discovered in the Linux kernel before 5.14.15. There is an array-index-out-of-bounds flaw in the detach_capi_ctr function in drivers/isdn/capi/kcapi.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/",
"refsource": "MISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://lore.kernel.org/netdev/CAFcO6XOvGQrRTaTkaJ0p3zR7y7nrAWD79r48=L_BbOyrK9X-vA@mail.gmail.com/"
},
{
"name": "https://seclists.org/oss-sec/2021/q4/39",
"refsource": "MISC",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "https://seclists.org/oss-sec/2021/q4/39"
},
{
"name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d",
"refsource": "MISC",
"tags": [
"Mailing List",
"Patch",
"Third Party Advisory"
],
"url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1f3e2e97c003f80c4b087092b225c8787ff91e4d"
},
{
"name": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15",
"refsource": "MISC",
"tags": [
"Mailing List",
"Release Notes",
"Third Party Advisory"
],
"url": "https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.15"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2013180"
},
{
"name": "[oss-security] 20211105 Re: Linux kernel: isdn: cpai: array-index-out-of-bounds in detach_capi_ctr in drivers/isdn/capi/kcapi.c",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2021/11/05/1"
},
{
"name": "[debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2021/12/msg00012.html"
},
{
"name": "DSA-5096",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5096"
},
{
"name": "[debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update",
"refsource": "MLIST",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2022/03/msg00012.html"
},
{
"name": "N/A",
"refsource": "N/A",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://www.oracle.com/security-alerts/cpujul2022.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-02-24T15:09Z",
"publishedDate": "2021-11-04T19:15Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.